last executing test programs: 22m14.679335236s ago: executing program 32 (id=1327): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xf, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000080000000000000000000000218110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000007b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r2}, 0x10) unlink(0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000de980000000000002d42c73e000000000000000000000000985c7e8edf65e96b6f5db9286d54dfb4859d0f34b9a68a6fac824ebb73b00209ee4b22e7a846a37fe35026242610bd0034a2ce7fc892039ee8b2db865ca632e52d75a23e4efe962aa59194012eea209a4dcb86eebbccbda391"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r7}, 0x10) openat$cgroup_procs(r5, &(0x7f0000000300)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 22m14.663693897s ago: executing program 33 (id=1331): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20800, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000180)=ANY=[@ANYRES8=r0, @ANYRES64=0x0], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x9) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="0100"}) 22m14.624213058s ago: executing program 34 (id=1332): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4000000, 0x20042, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000480)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffe6c) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x1, 0x4, 0x0, 0x9}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r10}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r11], 0x0, 0xc}, 0x94) write$cgroup_subtree(r9, &(0x7f00000002c0)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fefd000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 22m14.613423578s ago: executing program 35 (id=1329): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000007000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf301}) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000046682d562c31630100000000000000b52f0d6086e274aa97a91fa46cdcefe7534fda04ca542b4c4904446290f93bce3177127ebc0c24e7e718c0b1da96d9c9fa8e95238403007cb9806b9641253a7b99504c950fcba378fae7ec90b6da825996012194da80cc7621803fe840ccedca203b30524e6258edbfe64d0900cdf79924bfb82ad5cfe25853d4f3a2841f7d7e692bfb1387c1211d00d4cace5a0ae3fad859bc7cb33f20922abe3780b6d07d9dde639e27dc79daef403b188d618ab4928773db8fba724f8d8f46ff88fdf1e61dceef4ac7bb085eb915eb2f14927a5caef0f5224ef0e7219c3fe37b272f27e9aab8a31e258d6c14be1f1a31a8e68d00"/306], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000840)={r3, 0x0, 0x0, 0x0, &(0x7f0000000640), 0x0, 0x89, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10, &(0x7f00000001c0)=[{&(0x7f00000004c0)="9eb7fe6aeec778cde107bd3467604bfdee7c5c2d58ce44a890f16f3f755d89a2a2483d4a578bb67ebecd4c23245b673079df1af2f6a9f0df1e6ef718adde555494af3bdb269132d07415427576a3b128b92042ee52e7ab3e5f105ab6b3196032fa60c7ae83916155c890c43ea28afd9cdee7d81ad0f7bc50564b505444a87755c8d7124cdbf4b2bdcceb7564fe1fc0c90b9fbf584922c367facb387423b65a648c92e525d9314bba6b9fd6f28ee2e4452e36702e45411cdea61c3431fc93488e08654c6dfac5c307741b4f50eb898275906671de436ac2d0cc70630f6800edca042619fc35cd43c9cf4bea98195cc9a616", 0xf1}], 0x1}, 0x40010) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r7, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x18) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r6, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) recvmsg(r5, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) sendmsg$tipc(r5, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="1e032c004d8c71ef2885634a8270e7112f00"/30, @ANYRESOCT=r4], 0xffdd) 22m14.593656318s ago: executing program 36 (id=1330): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffd9e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100, 0x0, 0x2000000, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r3, 0x8982, 0x20000500) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x200, 0xe5a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0xa) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d030000000000000000000001100000008000000000000000000000030000000001000000"], 0x0, 0x4e}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)=ANY=[], 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r2, r5, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f00000003c0)=ANY=[], 0x5) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[@ANYBLOB="2d63707520a2fbfdbd963e6d6d64aa34d4236f3a28a3c4cecafd11885981b6388708f0789613be46592d"], 0x5) unlink(&(0x7f0000000340)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffd9) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) 21m48.836497286s ago: executing program 37 (id=1385): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x6a082, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'veth1_to_team\x00', 0xca58c30f81b6079f}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0a000000070000000300000001"], 0x50) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0a000000070000000300000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r3}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r6}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x4, r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/24], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) 21m48.826845057s ago: executing program 38 (id=1383): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000a5c6f5641aad42ef10673be9e5e5ccdb1025ed7cd3a6197a955e90db1f2d7d36b1ccedf9f0d27a54aa70a0326de4f747e5dff7f5f4800d0b3149aa5d39d5ee722da5dac9ca3bd033bd988bacbdf6a8f6b430", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000b00)=ANY=[@ANYRES16=r0, @ANYRES32=r4, @ANYRES8=0x0, @ANYRESHEX=0x0, @ANYRES8=r3, @ANYRES16, @ANYBLOB="7856322a4926f28b750800ba8caf32cf1df92f2f6959e40cc1735309ddd8594669da6e20b4376190b33c0f1882a2d4d85ab02bf511ca7ba1928026627adba2e3976127abacd0376330afd5332e091e418a7842b0b1172e9a20c07923026b8a687bcbbd9b87cc20aa1544ff43cdb9ca4dc160bdec54357df0d0ab7e0d2d458d9c9a13a36971d12bc9aa1598ea5d5f085897a1eb11bf2c0e91899f9858a164a5a194322c5124c42bbcedbc9929c603e8c4a38ff354ad2db222cb8be88905ee7c52716d82af7caf3620645b248a79f923d9f7fd849101d29235a4283641a8ea12942409", @ANYRES32, @ANYBLOB="9b7a769ebe5c8421de352ffca86088df90b2a91298c3311d513982ff158e1d0ec0626d4df2e26021ec4e8f39baa6c2713133a9819071badf143bf802465b94d95469c71ecd09497b20c7db8b1c20be23f1c0f73f6e6417815e21f912706de1403670750b0648e1d5c05000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x39, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) sendmsg$unix(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0\x00', 0x8) perf_event_open(0x0, 0x0, 0xb, r6, 0x1) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000014000000b7030000000000808500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000012008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x14000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) recvmsg$unix(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xffffffffffffffcc, &(0x7f0000000300)}, 0x40012103) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffe49) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) 21m48.799470537s ago: executing program 39 (id=1384): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0xe1, 0x1, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000200000000000000010000040002000000000000020000000000000000000000000000090300000000000000000000040000000000"], 0x0, 0x4a}, 0x28) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r5}, &(0x7f0000000a00), &(0x7f0000000a40)=r4}, 0x20) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\n\x00\x00\x00\f\x00\x00\x00\b\x00\x00\x00\b'], 0x50) (rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r6, &(0x7f0000000300), &(0x7f00000002c0)=""/6, 0x2}, 0x20) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r5}, &(0x7f0000000880), &(0x7f00000008c0)=r4}, 0x20) (async, rerun: 64) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x101000, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="280100000000000001000000"], 0x128}, 0x0) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x10}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}], 0x78}, 0x10100) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00', 0x2000}) (async) ioctl$TUNSETVNETBE(r7, 0x400454de, &(0x7f00000001c0)=0x1) (async, rerun: 32) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) (async) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) 21m48.779501887s ago: executing program 40 (id=1386): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYRES64], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f1100db5b686158bbcfe8875a65969ff57b03000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f1100db5b686158bbcfe8875a65969ff57b03000000000000000000000000ac1414aa"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='xprtrdma_inline_thresh\x00', r1, 0x0, 0x10001}, 0x18) 21m48.738550268s ago: executing program 41 (id=1377): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000b7040000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ff0f000000000000000000001801000020207025feffffffff1f20207b1af8ff00e81b64d79683a32c6857c5000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000838500000071"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kvm_ioapic_delayed_eoi_inj\x00', r1, 0x0, 0x9}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1, 0x0, 0x8}, 0x18) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0xd) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001040)={&(0x7f0000001280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@ptr={0x2, 0x0, 0x0, 0x2, 0x5}, @restrict={0x10, 0x0, 0x0, 0xb, 0x3}, @fwd={0x2}]}, {0x0, [0x5f, 0x61, 0x0]}}, &(0x7f0000001300)=""/91, 0x41, 0x5b, 0x1, 0x0, 0x10000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r6, 0xe0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000680)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x5b, &(0x7f00000014c0)=[{}], 0x8, 0x10, &(0x7f0000001500), &(0x7f0000001540), 0x8, 0x75, 0x8, 0x8, &(0x7f0000001580)}}, 0x10) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={&(0x7f00000028c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b0000000000000000000000008000000000000046127c1f14a453578f297231a2b2db6d6d321b1ecc13690dd2f137bf09b1ae4d795c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000004980)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, r3}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000580)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1b, 0x9, &(0x7f0000000300)=ANY=[@ANYBLOB="40670a0026ffffff6d8d040004000000180000003700000000000000b0000000180000000180000000000000060000001832000004000000000000000000000004b81600ffffffff"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000003980)=""/4096, 0x41000, 0x40, '\x00', 0x0, @fallback=0x2d, r7, 0x8, &(0x7f0000000440)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x3, 0x3, 0x7}, 0x10, r8, r2, 0x1, &(0x7f0000000600)=[r9, r0, r5, r10, r0, r0, r11, r9, r12], &(0x7f0000000640)=[{0x4, 0x4, 0x6}], 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000038c0)={0x30, 0x11, &(0x7f0000001100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@jmp={0x5, 0x1, 0xb, 0x1, 0x5, 0xffffffffffffffc0}, @jmp={0x5, 0x0, 0x8, 0xa, 0x3, 0x40, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001000)='syzkaller\x00', 0x8, 0x89, &(0x7f00000011c0)=""/137, 0x40f00, 0x42, '\x00', 0x0, @fallback=0x25, r7, 0x8, &(0x7f0000001380)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000013c0)={0x0, 0x4, 0x1ff, 0x4}, 0x10, r8, 0xffffffffffffffff, 0x0, &(0x7f0000001780), 0x0, 0x10, 0x6}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000082850000002d000000850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r13}, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 20m33.036286235s ago: executing program 42 (id=2040): r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x0, 0x5}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0100000004000000230500000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a8af3fb4f280fd8eeb1419a65ba6cca4781f3ac64f9b255a9a18a48ebd9084397ca8cefb8aff"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000280), 0x6, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0xf0}, 0x18) r4 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0xfc, 0x0, 0x0, 0xe000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x80000000}, 0x0, 0xc8, 0x0, 0x7, 0x1, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYRES8=r4, @ANYRES32, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="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"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000c578a564a4c1c501b0935e8469246b3584db1744a6df59ceb9f2604a1697d0729f902332db7837ceb5ca3aef7fff5a5778603efc337a095a5bc58de141e2fd33615f26175b7b010e9a639416b8dd00a6ae2974af9eb75aaa74ba183f499790f8551449cd8bd8557d0bda8507b2fb345d3800048d57d8cf48a12088636629af7eafdec3e895a1852b7a79d6df12d25bc1c246522da55224cf4987831070c59777a2a91bfe41a3cb42f2fe12a1595d90a55d8cd26b7abeb32c4e9fae170f0256c23109cef40565bc51bde67c1a", @ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000180)=r6, 0x4) sendmsg$inet(r8, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r11, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b702000001bc6500850000008600000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 20m32.991223306s ago: executing program 43 (id=2055): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0xbae}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x36c}, 0x48) 20m32.990960766s ago: executing program 44 (id=2052): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x6}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000010000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r0, 0x8, 0x0, 0x0, 0x18, &(0x7f0000000200), 0x1}, 0x6d) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0b00000000000000000008d3e7e5040200", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0700000004000000880200000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r5}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r6, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x0, r3}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r7}, &(0x7f0000000840), &(0x7f0000000880)=r3}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r7, &(0x7f0000000900)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x72bd1de2ad10b2b3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8940, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r10, 0x400454d9, &(0x7f0000000040)={'bridge0\x00', 0x400}) close(r10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 20m32.982607596s ago: executing program 45 (id=2056): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000000000000080000000803"], 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000005c0)='kfree_skb\x00', r6}, 0x18) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000980)='kfree_skb\x00', r8}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r1) sendmsg$tipc(r9, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x18) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={0x0, 0x0, 0x18}, 0x18) 20m32.948678247s ago: executing program 46 (id=2054): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) (async) socketpair(0x2, 0x80806, 0xbc07, &(0x7f0000001740)) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8982, &(0x7f0000000080)) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000004c0)='xprtrdma_post_linv_err\x00', r3, 0x0, 0x5}, 0x18) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) ioctl$TUNSETVNETLE(r10, 0x400454dc, &(0x7f0000000280)=0x1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 14m18.297458987s ago: executing program 47 (id=7657): bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0xe3733f860dce9c1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r1, 0x8982, 0x20000500) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r0, r2, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x50) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x20) 14m18.255444038s ago: executing program 48 (id=7658): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x20, &(0x7f00000001c0)={&(0x7f00000004c0)=""/203, 0xcb, 0x0, &(0x7f0000000600)=""/83, 0x53}}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x16, 0x3, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}}, &(0x7f0000000000)='GPL\x00'}, 0x94) r3 = bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe80) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='rseq_update\x00', r1, 0x0, 0xba3}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r1, &(0x7f00000003c0)=0x1, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[], 0xfffffdef) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x18) write$cgroup_pid(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 14m18.238092408s ago: executing program 49 (id=7661): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 14m18.213514028s ago: executing program 50 (id=7660): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0xba27, 0x8, 0x9, 0x80, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0xffffffffffffffff, 0xfffffffd, 0x8}, 0xc) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2}, 0x50) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0xfffff801}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0xffffffff, 0x0, 0x7, 0x38900, 0x1, 0x7f, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x5, 0xb}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x2}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @map_idx_val={0x18, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x6, &(0x7f00000000c0)=""/6, 0x40f00, 0x0, '\x00', r0, @fallback=0x38, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x4, 0xf, 0x1, 0xad}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r1, 0x1, r2, r3, r4, r5, 0x1, r6], 0x0, 0x10, 0x9}, 0x94) r7 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000740)={r7, &(0x7f0000000600)="70af1a06b352f885f6d3bfb392a04b59e18751927f5b43b377e7b8ecbb119f6ac8b5dedcaebf753b42897d0e2c805436a76570d4229c0893b3a1082c6db8a57b83814d4343f6856cabbebceab2d895ac5850a6d9028325bda8c9a8ff82184064002420c397df5999fab496cd02379db8524ac1e94811f091bea3f1be510562f93a188baa971032b867b905d8a47f8b26c31f960fc3b05cb3ae4c85593ea01bb199da6a4c3e3f83b6a709cd3bab0fff352bc57f0039b6d83595da2be39b43e77b01c28bc8ce8b8d4244a145d7b2", &(0x7f0000000700)=""/18}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000840)={r3, &(0x7f0000000780)="fa29949442f16fd408aa9a86edabd0b28706037035a86674aea8dd77d0e216fbdb477304474b037016212526b17eed0f6b16a52cf06fdea50d64e0b75f21fa3d7cdc9d1cb9c0155e3de1426fa2617c6146ce9ab1bff5639989fd1afa7dcade516adb1f7612225c44aeece840e3a3df5da3e017882e9b8aab3755d8952e85c0420f24b651e1c0a7d4d8"}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001a80)={&(0x7f0000000880)="80f1ea0bf120cbb841de26e33376c9935fa0ac5afdf890d22e7a2864fd820f0cc5e53dcd0690cdb4e7", &(0x7f00000008c0)=""/4096, &(0x7f00000018c0)="bcb090ac81dc39f575565e4ccc7cbffb616175a36fd15829381180896ca49b8839c9ea6b144aa153b10e48866e78a84f6ad3cb54388b88e15c14c192c8543585ac8a90381c325c4afd72397ba784e3dd9d4f15cfb83e0eab326ca2df1a323583a01f1fb2a943970c38612c6a74182a2be29d1839e6ad9b9d427599bf5fe0b7283d032893b153db0511f7a5f7043d7937ab4b463fea8b169c3db72f7787a0d45cc472e09aff52d06d9a135b4d3003bb670f072b3e74b37b7d891bf8b045210a", &(0x7f0000001980)="53fb1d3b809410a10b158c27cfd11923977548d13d045b4bbf7947c3f5828bf236cfc6b9b19607fbca5b3410b3ca003bc410817d9a002485cf8354d2b6278b9046338011fc15395fa6c0e02b43cc6b1500368684605fb31d1f064c4f9500606186956607b1b1c333c517576fdb38418b14ac555c5c92e470b23944bf7d0b49a5eb56fed09cbb9ac4cdc66a6cd3c1ab6fa92648dfe2b8fdacbfbed5e524ff8f37297f1cf77d9262da766f1ac64235b9cce49eb2e3f96f41ce3c584e0f5c11a6e45fa402b53929e08717de97116743", 0x80, r4, 0x4}, 0x38) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000001ac0), 0x10b000, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000001b00)={'wg2\x00', @local}) ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000001b40)) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000001b80)={'syzkaller0\x00', 0x400}) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001bc0)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x3, '\x00', r0, r7, 0x3, 0x3, 0x5}, 0x50) recvmsg$unix(r7, &(0x7f00000021c0)={&(0x7f0000001c40), 0x6e, &(0x7f0000002080)=[{&(0x7f0000001cc0)=""/205, 0xcd}, {&(0x7f0000001dc0)=""/151, 0x97}, {&(0x7f0000001e80)=""/111, 0x6f}, {&(0x7f0000001f00)=""/236, 0xec}, {&(0x7f0000002000)=""/95, 0x5f}], 0x5, &(0x7f0000002100)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}, 0x40000140) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002200)) openat$cgroup_subtree(r13, &(0x7f0000002240), 0x2, 0x0) gettid() perf_event_open(&(0x7f0000002280)={0x3, 0x80, 0x75, 0xb, 0x25, 0x4, 0x0, 0x3, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x34, 0x1}, 0x240, 0x4, 0x7, 0x4, 0x8, 0xa6f9, 0x362, 0x0, 0xe4, 0x0, 0x6}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002380)={{r16, 0xffffffffffffffff}, &(0x7f0000002300), &(0x7f0000002340)=r14}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002440)={{r18}, &(0x7f00000023c0), &(0x7f0000002400)=r14}, 0x20) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000002680)={0xd, 0x3, &(0x7f00000024c0)=@raw=[@ldst={0x2, 0x3, 0x0, 0x1, 0x1, 0x1, 0xfffffffffffffff0}, @map_val={0x18, 0x3, 0x2, 0x0, r11, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000002500)='GPL\x00', 0x100, 0x8d, &(0x7f0000002540)=""/141, 0x0, 0x7, '\x00', r0, @sock_ops=0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002600)={0x2, 0xa, 0x7, 0x8}, 0x10, 0x0, r11, 0x0, &(0x7f0000002640)=[r6, r10, r9, r15, r10], 0x0, 0x10, 0x9}, 0x94) r20 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002740)=@o_path={&(0x7f0000002480)='./file0\x00', 0x0, 0x4000, r19}, 0x18) socketpair(0x2c, 0x2, 0x40, &(0x7f0000002780)) recvmsg(r12, &(0x7f0000002b00)={&(0x7f00000027c0)=@rc={0x1f, @none}, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000002840)=""/186, 0xba}, {&(0x7f0000002900)=""/160, 0xa0}, {&(0x7f00000029c0)=""/233, 0xe9}], 0x3}, 0x2100) bpf$MAP_CREATE(0x0, &(0x7f0000002b40)=@base={0x16, 0xd0a5, 0x1, 0x7ff, 0x408, r20, 0x1, '\x00', r0, 0xffffffffffffffff, 0x4, 0x0, 0x3}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', r0, r17, 0x5, 0x1, 0x5}, 0x50) 14m18.197703789s ago: executing program 51 (id=7659): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002080)={&(0x7f0000000300)='kfree\x00', r1}, 0x10) socketpair(0xa, 0x3, 0x2, &(0x7f00000006c0)) 11m47.44575971s ago: executing program 52 (id=9725): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x2b, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000480)={0x734}, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x7, 0x2, &(0x7f0000000040)=@raw=[@ldst={0x0, 0x3, 0x0, 0x8, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000180)='syzkaller\x00', 0x4, 0x9b, &(0x7f0000000280)=""/155, 0x41100, 0x50, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xa, 0x5, 0xc}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000340)=[r2, r2, r2, r2, r2, r2, r2, r2, r2], &(0x7f0000000380)=[{0x4, 0x1, 0xe}, {0x0, 0x8, 0xa, 0xa4cfae1c153e7c51}, {0x0, 0x2, 0x7, 0x4}, {0x3, 0x3, 0x2, 0x6}], 0x10, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='gpio_direction\x00', r3, 0x0, 0x7}, 0x18) (async, rerun: 64) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0x800000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb01005ffc0000000000000000000000000000e70000000000"], 0x0, 0xfc5f}, 0x20) (async, rerun: 32) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 11m47.291341873s ago: executing program 53 (id=9730): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x64}, 0x0, 0x30000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x5, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x61}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000ae000000b703000007000000850000000e000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0xff, 0x5, 0x0, 0x2, 0x44c04, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x8}, 0x0, 0xc8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0x41, 0x0, &(0x7f0000000500)="b90a00000044268cb89e14f086ddedcfb7beec3ad56d65e26a696578ec93ae803b9545e1a3a8d76d", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x101, 0x7ffc, 0xcc}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000008000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0xfffffffffffffffe, 0x0) recvmsg$unix(r6, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000cc0)=ANY=[@ANYRESOCT=0x0], 0xfdef) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0a00000007000000ff0f000007"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r10, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffffffffffffe80, &(0x7f0000000400), &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x84, &(0x7f0000000540)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f0000000680), 0x8, 0x98, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) 11m47.275446124s ago: executing program 54 (id=9741): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) (async) recvmsg(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r5) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00/\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x1c, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0xfc, &(0x7f00000005c0)=""/252, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000700)={0x0, 0x4, 0x1, 0xffff}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000740)=[r7, r7, r7], &(0x7f0000000780)=[{0x0, 0x4, 0x0, 0x7}, {0x2, 0x2, 0x9, 0x1}, {0x4, 0x4, 0xa, 0x2}, {0x1, 0x3, 0x5, 0x5}, {0x5, 0x1, 0xf, 0x1}, {0x0, 0x1, 0x5, 0x8}], 0x10, 0xfffffff8}, 0x94) (async) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x1c, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}]}, &(0x7f0000000340)='GPL\x00', 0x10000, 0xfc, &(0x7f00000005c0)=""/252, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000700)={0x0, 0x4, 0x1, 0xffff}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000740)=[r7, r7, r7], &(0x7f0000000780)=[{0x0, 0x4, 0x0, 0x7}, {0x2, 0x2, 0x9, 0x1}, {0x4, 0x4, 0xa, 0x2}, {0x1, 0x3, 0x5, 0x5}, {0x5, 0x1, 0xf, 0x1}, {0x0, 0x1, 0x5, 0x8}], 0x10, 0xfffffff8}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r7}, &(0x7f0000000000), &(0x7f00000002c0)=r8}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r7}, &(0x7f0000000000), &(0x7f00000002c0)=r8}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 11m47.252472214s ago: executing program 55 (id=9739): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x88541, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_MAP_GET_FD_BY_ID(0x9, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x4d, 0x0, 0x3}]}) syz_clone(0x2809200, 0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)="fe5664c745d5") r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 11m47.233574544s ago: executing program 56 (id=9740): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0x1000}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x43}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x1, 0x56d, 0x2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600), &(0x7f0000001f80), 0xfffffffb, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000000100)="7707cad7e7731e6919f19ce1484215dda3a125b268c33a7fa2465af196a158edf787e69d2bd13171f0d90ec7d06bcbbac502b46cb25858ae767ed8d951c5d3491a6f335eb604e09ae91086eaf5a7a1f72162cb42bd722a5ee84398814ac605543b3801839476f525c4d040ab850f4dd880c3a656d834bd875de4242b481ba0c633d8b29af01e649807f6c855d91aec42d593462db847b7301b1993d0a83e6209ccc85a396e0f03b2", &(0x7f00000001c0)=""/200, &(0x7f00000002c0)="0712", &(0x7f00000003c0)="7601983d9ab0fc8f3f044ed73762c9c9fca4abff5c0a0995c7ce6b42da7d71f21677653989635bb9f3994b1523cce93600c4bb1a62347ee9b65f92fb60a8c574af7fa9df47f5940d68bfbba2f2c9632e35ab2de18ddf2f34c93f75d809a8a9dcf77296edd7da2be1a58cccf13cc39105dbbc759833a45c9b0bc73af56124e1d9024829ada8cc5aa4229b76cc8cb7e4d75975bc48d73ad658f7c1a85e20a6", 0x80000001, r2, 0x4}, 0x38) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0xfdef) 10m23.287094906s ago: executing program 7 (id=11175): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x18) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000400), 0x2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x0, 0x7ffd, 0x2, 0x45, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1, 0xa}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000008200000000a48045a100"/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x556890a0afa510b7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'macsec0\x00', @local}) 10m22.915780463s ago: executing program 7 (id=11180): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x8, 0x0, 0x9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x2}, 0x8144, 0xc8, 0xffffffff, 0x2, 0x0, 0x341, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018010000756cff7c00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10m22.786049006s ago: executing program 9 (id=11181): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0xb6}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x77}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2b}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000082850000002d000000850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r1}, 0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x29, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x3f, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x1, '\x00', r3, r4, 0x0, 0x0, 0x1}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x20) write$cgroup_subtree(r6, &(0x7f0000000500)=ANY=[], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x11, 0xd, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, [@call={0x85, 0x0, 0x0, 0x3b}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x6}, @generic={0x7, 0x1, 0xb, 0x148, 0x10000}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000300)='syzkaller\x00', 0x2, 0xb8, &(0x7f0000000800)=""/184, 0x40f00, 0x8, '\x00', r3, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000740)={0x4, 0x2, 0x9}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000780)=[r2], &(0x7f00000008c0)=[{0x2, 0x4, 0xf, 0x5}, {0x0, 0x2, 0x7, 0x9}, {0x3, 0x5, 0xf, 0x5}, {0x0, 0x1, 0x0, 0xc}, {0x3, 0x2, 0xd}, {0x0, 0x4, 0xf, 0x2}], 0x10, 0x7}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b70300000000000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="02fa5be6ffdbce62337738bd0000000000000000", @ANYRES32, @ANYBLOB="000000fdc470cb00000000a41f183bd7ccbda0fd1355ff30de6636f7e8a8aaa074655b02e812350e52cca9c4b8b9b78daa1731ee0333c8407cb871b76a1d3d99416c91127688284dadb7dfe4ac3e6a368e2130fc4ff70226d8f7acd20a4edde40763436744184cf64866b83ad22f2281b95777662836e4630c8c365e33215e08d2e7e53ccf985439920244e8c133784f7dc7fc1552433e6cfc9286f779583a99f10a69140212d0761ed43bc97d2d18820caf40ed556c10ed4a", @ANYRES32=r7, @ANYRES32, @ANYRESHEX=r0], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r8, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000400)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x4000, r9}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000f6ffff0700181100001d61b4fcffff4b72448ca626e45e985055de4477c0285ab7471fb990d6c6", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r12, &(0x7f0000004440)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x2, {0x4e22}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740), &(0x7f00000007c0), 0xffffd6c0, r9, 0x0, 0x20}, 0x38) 10m22.773634086s ago: executing program 7 (id=11183): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0)=0x60ff20038000, 0xfffffdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(r2, &(0x7f0000000580)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000500)=""/123, 0x7b}], 0x1}, 0x40000103) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xa, &(0x7f0000000440)=@raw=[@printk={@u}, @jmp={0x5, 0x1, 0x8, 0x6, 0x5, 0x0, 0x1}, @jmp={0x5, 0x1, 0x3, 0x4, 0xa, 0x20, 0xffffffffffffffff}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x80000001, 0x0}, 0x8) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x8, 0x0, 0x9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x2}, 0x8144, 0xc8, 0xffffffff, 0x2, 0x0, 0x341, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r8}, 0x10) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r9}, 0x10) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 10m22.315524554s ago: executing program 8 (id=11190): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0xffffffffffffff63, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0, 0xfffffffffffffe08}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x5, &(0x7f0000000000)=ANY=[], 0x0}, 0x94) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000fbf1e2f3059c82b800"/36], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYRES16=r2], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) syz_clone(0x7a872000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x8000000000000, &(0x7f0000000300)=@base={0x14, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000f969c179b9cabbe57de8941b99449d733e4fdc31e003520652065e35b8ccd815366dbd01bf1af7d647d6b09f202dbb5f205214201f3cd4e14303587db8f41e388af5d464f6eb20516d9492169c8aa3f906b70aaf67b5c2551e01810e030af1387480e3412b54865688b4b863eb335977864808d3bfefbc8920c62048cf4c8d559fb3d0af4ac297e404edf76f37d4870a9a5fe07b2c2d619f1dd759ca04298eb429e65b67f05925fe18c6da34d522107df8d95b70a52d828041", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 10m21.908001932s ago: executing program 9 (id=11195): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'macvlan1\x00', 0x200}) r1 = getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080)=r1, 0x12) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x200300, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380), 0x10000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000540)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000200)="cecb52fcadefee1c7e08d2b915809dc7d49e731f0b58f2594c95874b5439c5eda43a6c448ee5f51900e773c1b923374c477ac16e72ab36455b749a1362208461e1ab8533a7c655cb7d624bf6640473dd747ac735498b453560207bc015d090647f67a6a7d5f87a00b86b13ddbb87fcdb2017b743", 0x74}, {&(0x7f0000000280)="8e79fbf6cd1c4fcb9f939d273c7a3e3e90ce7a389b40fe742e480a371bc2197dc4df48aa33c9fc72d64f1aaf1fe1da8b09175fdebee221bbff7103e7c23e96c0d7f5a4a902f8077041510d6555c82d990f243f3f72c52caa734a12fe81afc5c0e6785ae31d368610156ad56fba462f0002d0956197576c43add20b3bc987ee5223fed0c56b58836c8fe3809f200b", 0x8e}], 0x2, &(0x7f0000000400)=[@rights={{0x18, 0x1, 0x1, [r2, r2]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [r0, r3, r3, r2, r5, r0, r3, r0, r6]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee01, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r3]}}, @rights={{0x28, 0x1, 0x1, [r0, r2, r2, 0xffffffffffffffff, r2, r3]}}], 0x110, 0x20040404}, 0x1) write$cgroup_pid(r2, &(0x7f0000000580)=r1, 0x12) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000600)=@generic={&(0x7f00000005c0)='./file0\x00'}, 0x18) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000640)={'veth1_macvtap\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x4, &(0x7f0000000700)=@raw=[@map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x63, &(0x7f0000000780)=""/99, 0x41100, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x4, 0x9, 0x7, 0x3ff}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000880)=[{0x5, 0x2, 0xb, 0x8}, {0x4, 0x5, 0x3, 0x2}, {0x1, 0x5, 0xd, 0x2}], 0x10, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f00000006c0)='devlink_trap_report\x00', r7, 0x0, 0x401}, 0x18) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000009c0)=r7) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000a00)={'ip6gre0\x00', @local}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000a40)={'vxcan1\x00', 0x2000}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000a80)={'bridge_slave_0\x00', 0x20}) unlink(&(0x7f0000000ac0)='./file0\x00') r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c40)={&(0x7f0000000b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x7, [@restrict={0xe, 0x0, 0x0, 0xb, 0x1}, @var={0x2, 0x0, 0x0, 0xe, 0x2}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x0, 0x44, 0x4}, @typedef={0x3, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x5f, 0x0, 0x30, 0x5f, 0x61]}}, &(0x7f0000000b80)=""/147, 0x57, 0x93, 0x1, 0x100}, 0x28) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000c80)={'team_slave_0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3c}}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=@bloom_filter={0x1e, 0x3, 0x5, 0x5, 0xd05a7ffb8371fbfb, 0xffffffffffffffff, 0x4, '\x00', 0x0, r8, 0x5, 0x3, 0x1, 0xf, @value=r8, @void, @value=r8}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x58, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000e00)={0x1b, 0x0, 0x0, 0x6, 0x0, r9, 0x9, '\x00', r10, 0xffffffffffffffff, 0x2, 0x1}, 0x50) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000e80)='syz1\x00', 0x200002, 0x0) r12 = openat$cgroup_ro(r11, &(0x7f0000000ec0)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r13 = openat$cgroup_procs(r12, &(0x7f0000000f00)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r13, &(0x7f0000000f40)=r1, 0x12) 10m21.905687392s ago: executing program 7 (id=11196): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="180000ee1e0000f5ffffffffffffffcc6b4a398392b30c7a897af794e6f5e3b1e8faa8972f2b7d054d7306adcb175df131cf107d8182718cf93503dd82ea13fb14b9587c851bd46cb49a71ddd066ab7cb6b2cf33fa381a9fae08ee69bf36ffd226a3a25a22f996acf84c06f5f025803df43d06063fe68ed909e989b8876a5809f663e35726540b780db18af72fa59d0f65eabb69e29955caf0925d6ed7b5d39d00000018ac0100000d", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[], 0x48) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 10m21.904948752s ago: executing program 9 (id=11197): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x0, 0x2101}, 0x50) (async, rerun: 64) socketpair(0x2a, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x8000c, 0x8}, 0x410, 0x2000001, 0xfffffffc, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) close(r1) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000000), 0x4) sendmsg$inet(r2, &(0x7f0000002d40)={0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000000040)='P', 0xfe1b}], 0x1}, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xb, r3, 0x4}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r4}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 10m21.799473374s ago: executing program 9 (id=11198): socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0be7f576d931f67b000000fbffffff000400000900000001000000619dae2a4023970b84fd1b5c15d08c3563f43ace811ee5cf865f177af5daa9b57f8290d1aa7932423244a1284a54f1bf352d8dfd48781ab43762bf24871e1475213202f00b7cf61c31af9e721c7fffd4bf896fd89f3af82b9c073cebd19ff35f773f2a249d6843e7df608ff218ad1066886fb884411c05c8c8133d71a6", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x5452, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x10, 0xc, &(0x7f0000000500)=ANY=[@ANYRESOCT, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00a9d8470d7bb8640d0000000000b70400f06d000000925e850000000100"/65], 0x0, 0x0, 0x0, 0x0, 0x0, 0x79, '\x00', 0x0, @sk_msg=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000400)=ANY=[@ANYRES64=r3], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sock=0xd, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0x12, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@map_fd={0x18, 0x7, 0x1, 0x0, r1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffff2d6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x626f}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 10m21.785977944s ago: executing program 8 (id=11199): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x4, 0x6, 0x80, 0x42}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x11, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000206a932500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f00000012c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001a80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)="e2c5cf426f", &(0x7f0000000080), 0x619, r1}, 0x38) 10m21.755462055s ago: executing program 7 (id=11201): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="1800"/13, @ANYRES32=r2, @ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r3, 0x0, 0x200000000000000}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xa, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8912, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x2, 0xfffffffffffffffc, 0x8}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdd, 0x3, 0x0, 0x0, 0x0, 0x4000000000, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0xffffffffffffffff, 0x400000000000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x2d) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x129800, 0x0) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX, @ANYRES16=0x0], 0x0}, 0x94) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0x5, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0x9, &(0x7f0000000940)=ANY=[@ANYBLOB="0064044910df50f8ed53000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000030000008500000082000000"], &(0x7f0000000140)='syzkaller\x00', 0xe, 0x0, 0x0, 0x40f00, 0x1, '\x00', r12, @fallback=0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0x9, 0x4, 0x7f}, 0x10, 0xffffffffffffffff, r10, 0x1, &(0x7f0000000640)=[r13, r14, r2, r1, r1, 0xffffffffffffffff, r0, r1, r2], &(0x7f0000000680)=[{0x5, 0x4, 0xa, 0x7}], 0x10, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r11}, 0x10) 10m21.609634508s ago: executing program 9 (id=11203): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r1, &(0x7f0000000980), 0x20000992) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8}, 0x48) close(r3) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r2}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x19, 0x4, 0x4, 0x6, 0x10, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x14, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000080000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca20000000a0000a6020000f8ffffffb703000008000000b7040000000000008500000033000000180100002020702500000000002020207b1af8ff00000000bfa1f7ff0000000007010000f8ffffffb702000008000000b703000001ffffff850000000600000095000000000000006f205390b92e426a76a7129a42ac38a7"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000010000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f0000000040)=ANY=[@ANYBLOB='-4'], 0xc) close(r8) openat$cgroup_freezer_state(r6, &(0x7f0000000380), 0x2, 0x0) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r11, &(0x7f0000002b00), 0x2, 0x0) 10m21.606530968s ago: executing program 7 (id=11204): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x10, &(0x7f0000000d00)=ANY=[@ANYBLOB="58000000080000000000000040000000181100008c4d79c50b413b4fdba469450c96a920b7270d15bb2fb4329712a5cd3d958cc1d489c3e3caf143f027dd334507005525c596aa71aa32ca5b613d9b3d7e0d2d09eff7f0e4ff10230123eb1e531024a86771942a0c4f2c91289a3a604f95d67c6ef20e3a81bc40fc12a4f44c7aea904e594c32f57b107f30b273612dcf89bb7fe9081209f999f044c2b0b687e9058095cf800ca8189b875e673e85d8c55554a767d2cae42a966f7f12005f51c272f902681b30fdb699dc8d1817157ea852206b24f72d", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001745f0ffffffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000380)='syzkaller\x00', 0xd1, 0x58, &(0x7f0000000900)=""/88, 0x41100, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0xf, 0x7}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000a00)=[{0x2, 0x1, 0x7, 0xc}, {0x2, 0x4, 0xb}, {0x3, 0x4, 0xa, 0x2}], 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000340)='spmi_write_begin\x00', r0, 0x0, 0xd06}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x1f, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/300], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc90}, 0x48) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9b}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="740a000000000000617f764b87000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a, 0x4, @perf_bp={0x0, 0x1}, 0x10409a, 0xa1b7, 0xffffffff, 0x0, 0x1ff, 0xffffffff, 0x0, 0x0, 0xffffb7fe, 0x0, 0x8}, 0x0, 0x5, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) write$cgroup_subtree(r2, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000000)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="05000000040000000400c1a08afb000000000000", @ANYRES16=r3, @ANYBLOB="0000000000002d6695450a000000000000000000", @ANYRES32=0x0, @ANYRESDEC=r4, @ANYBLOB="0000000000000000000000000000f27d8600"/31], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x5, 0x17, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r7}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r2, &(0x7f0000000740)="73031a7efb41f5e6aa9f16455049df9fdedb34bae2a0cf8dd150379e33f857378e0e4630a9b55d81138de2196d71401c8c0e7a2df0e5258a83d99edb92fe1650ab35acddc97296447812d3ee7e4f058024be8f4dcc116754e19164a8e1cfe0271a40dde915fa318c094eb5e75ffea29d820f50e4d7c458f84827491751f626de45ebab49b406bdc17c72052617a2c6115bd0cceb185e6df0e6d2c06e36448b0872da3f3d911e8565b4cafcb698ee7ed87c5591096a739a25d90050855e0721611bf38de3e371d048cb5d76", &(0x7f0000000840)=""/171}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000050000000100000007"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x0, r10}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r10, &(0x7f00000002c0), &(0x7f0000000500)=""/204}, 0x20) 10m21.605245228s ago: executing program 8 (id=11205): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r2, 0x0, &(0x7f0000000040)=""/118}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r3}, 0x18) syz_clone(0x100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000201000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb5, 0x0, 0xfe, 0x2, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r1, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000102c0)={r5, 0xe0, &(0x7f00000101c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000010000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000010040)=[0x0, 0x0], &(0x7f0000010080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x72, &(0x7f00000100c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000010100), &(0x7f0000010140), 0x8, 0xc6, 0x8, 0x8, &(0x7f0000010180)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r0, &(0x7f00000006c0)={&(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000240)="5ef3c6c1ad459afa918bd2427ca2a3eec1bf06057c3d0554b75492578a4d6807bca56b710a232bb1eac582e8f6f0e48a8a16a5871839c856e38dccefeaa74e46c938fa3af8e7aeee86808ca0a4c5a291e68adb3aa48cacdec6365a1e7bc45c52834887fd22424a55bfe780bf569d59983faa8e9fe489faeb8c79d818cbe4a43f91c37d26", 0x84}, {&(0x7f0000001380)="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", 0x1000}], 0x2, &(0x7f0000000580)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @rand_addr=0x64010102}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7e}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xa8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @multicast1, @multicast2}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @rand_addr=0x64010102}}}], 0xd8}, 0x4ac71f9190a8123a) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x30000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8c, 0x8}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r7, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) 10m21.535516609s ago: executing program 8 (id=11206): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000500)='fib_table_lookup\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x5, 0x2, 0x7, 0x41, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000003000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b7040000000000008500000003000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 10m21.464301491s ago: executing program 8 (id=11208): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x702, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8943, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7020000dfff0000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r7}, 0x10) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) 10m21.458378911s ago: executing program 9 (id=11209): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='timer_start\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)=r1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r0, 0xe0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000840)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000880)=[0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe5, &(0x7f0000000900)=[{}], 0x8, 0x10, &(0x7f0000000980), &(0x7f00000009c0), 0x8, 0x94, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0xb, 0x24, &(0x7f0000000e00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x800000}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x8, 0x8, 0x0, 0x18}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x2, 0x1, 0x0, r3}]}, &(0x7f00000005c0)='GPL\x00', 0x10000, 0xd, &(0x7f0000000600)=""/13, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, r4, r0, 0x1, &(0x7f0000000a80)=[r2, r2], &(0x7f0000000ac0)=[{0x1, 0x5, 0x9, 0x6}], 0x10, 0xc112}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000001000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='timer_start\x00', r5}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r6}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0xffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) r9 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x30120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x202, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r11 = syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r12}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r13, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0xfa, 0x2, 0x3, 0x81, 0x0, 0x1, 0x20080, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7a8f, 0x0, @perf_bp={&(0x7f00000004c0), 0x8}, 0x4, 0x10700000000000, 0x96f, 0x9, 0x0, 0x21, 0x2, 0x0, 0x3, 0x0, 0x2}, r11, 0x6, r9, 0xc) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8982, &(0x7f0000000080)) 10m21.383375282s ago: executing program 8 (id=11210): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x73) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={@cgroup=r0, 0xe, 0x1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000439c327d19956be78558c36196cc49151bd2470424c91fb10b404a9a1e99bcf2acb18951325c123099921bb7882a8285d223d5342ca1fdc8cec95a30864df728511cddf7f6e59f6e5aa2b793e9b512fafecf16f76b2af50ae53b2bc9cec84425e3ca0e7ec43ea4feebe5e2b5c40c3203519a5cf000a3621cac9ded"], 0x50) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f00000009c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000b7020000000000007b9af8ff00000000b6090000000000007baaf0ff00000000bf2700000000000007080000fffdffffbfa400000000000007040000f0ffffffc40700000800000018220000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008791c004608efff76000000bf9800000000000500090000000000008500000005000000b70000000000000095000000000000000a829cbb2bc075ed0f18329608fa4efcb662dad3e564015fbc109bbe07b93c85e34121805a51c00f0147c2e9b157010e5342764bee9b303cbbff1ccde3"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r3, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x21, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x8a, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000200000000000000ffff000000000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=r5, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x54, 0x5, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r8) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 10m1.946909149s ago: executing program 57 (id=11207): syz_clone(0x11, 0x0, 0xfffffffffffffe5a, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040018}, 0x0) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fffa) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) write$cgroup_type(r3, &(0x7f0000000100), 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0xfffffffffffffffc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 10m1.940186919s ago: executing program 58 (id=11211): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x1a}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2], 0x18}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x684, 0x0, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) close(r5) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0xffff0000, 0xf0, 0x0, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x48) 10m1.919054819s ago: executing program 59 (id=11204): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x10, &(0x7f0000000d00)=ANY=[@ANYBLOB="58000000080000000000000040000000181100008c4d79c50b413b4fdba469450c96a920b7270d15bb2fb4329712a5cd3d958cc1d489c3e3caf143f027dd334507005525c596aa71aa32ca5b613d9b3d7e0d2d09eff7f0e4ff10230123eb1e531024a86771942a0c4f2c91289a3a604f95d67c6ef20e3a81bc40fc12a4f44c7aea904e594c32f57b107f30b273612dcf89bb7fe9081209f999f044c2b0b687e9058095cf800ca8189b875e673e85d8c55554a767d2cae42a966f7f12005f51c272f902681b30fdb699dc8d1817157ea852206b24f72d", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001745f0ffffffffffbf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000380)='syzkaller\x00', 0xd1, 0x58, &(0x7f0000000900)=""/88, 0x41100, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x1, 0x8, 0xf, 0x7}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000a00)=[{0x2, 0x1, 0x7, 0xc}, {0x2, 0x4, 0xb}, {0x3, 0x4, 0xa, 0x2}], 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000340)='spmi_write_begin\x00', r0, 0x0, 0xd06}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x1f, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/300], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc90}, 0x48) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9b}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="740a000000000000617f764b87000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a, 0x4, @perf_bp={0x0, 0x1}, 0x10409a, 0xa1b7, 0xffffffff, 0x0, 0x1ff, 0xffffffff, 0x0, 0x0, 0xffffb7fe, 0x0, 0x8}, 0x0, 0x5, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) write$cgroup_subtree(r2, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000000)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="05000000040000000400c1a08afb000000000000", @ANYRES16=r3, @ANYBLOB="0000000000002d6695450a000000000000000000", @ANYRES32=0x0, @ANYRESDEC=r4, @ANYBLOB="0000000000000000000000000000f27d8600"/31], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x5, 0x17, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r7}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r2, &(0x7f0000000740)="73031a7efb41f5e6aa9f16455049df9fdedb34bae2a0cf8dd150379e33f857378e0e4630a9b55d81138de2196d71401c8c0e7a2df0e5258a83d99edb92fe1650ab35acddc97296447812d3ee7e4f058024be8f4dcc116754e19164a8e1cfe0271a40dde915fa318c094eb5e75ffea29d820f50e4d7c458f84827491751f626de45ebab49b406bdc17c72052617a2c6115bd0cceb185e6df0e6d2c06e36448b0872da3f3d911e8565b4cafcb698ee7ed87c5591096a739a25d90050855e0721611bf38de3e371d048cb5d76", &(0x7f0000000840)=""/171}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000050000000100000007"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x0, r10}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r10, &(0x7f00000002c0), &(0x7f0000000500)=""/204}, 0x20) 10m1.903169659s ago: executing program 60 (id=11210): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x73) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={@cgroup=r0, 0xe, 0x1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000439c327d19956be78558c36196cc49151bd2470424c91fb10b404a9a1e99bcf2acb18951325c123099921bb7882a8285d223d5342ca1fdc8cec95a30864df728511cddf7f6e59f6e5aa2b793e9b512fafecf16f76b2af50ae53b2bc9cec84425e3ca0e7ec43ea4feebe5e2b5c40c3203519a5cf000a3621cac9ded"], 0x50) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f00000009c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000b7020000000000007b9af8ff00000000b6090000000000007baaf0ff00000000bf2700000000000007080000fffdffffbfa400000000000007040000f0ffffffc40700000800000018220000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008791c004608efff76000000bf9800000000000500090000000000008500000005000000b70000000000000095000000000000000a829cbb2bc075ed0f18329608fa4efcb662dad3e564015fbc109bbe07b93c85e34121805a51c00f0147c2e9b157010e5342764bee9b303cbbff1ccde3"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r3, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x21, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x8a, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000200000000000000ffff000000000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=r5, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x54, 0x5, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r8) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 10m1.87513714s ago: executing program 61 (id=11209): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='timer_start\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)=r1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r0, 0xe0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000840)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000880)=[0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe5, &(0x7f0000000900)=[{}], 0x8, 0x10, &(0x7f0000000980), &(0x7f00000009c0), 0x8, 0x94, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0xb, 0x24, &(0x7f0000000e00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x800000}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x8, 0x8, 0x0, 0x18}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x2, 0x1, 0x0, r3}]}, &(0x7f00000005c0)='GPL\x00', 0x10000, 0xd, &(0x7f0000000600)=""/13, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, r4, r0, 0x1, &(0x7f0000000a80)=[r2, r2], &(0x7f0000000ac0)=[{0x1, 0x5, 0x9, 0x6}], 0x10, 0xc112}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000001000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='timer_start\x00', r5}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r6}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0xffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) r9 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x30120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x202, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r11 = syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r12}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r11, r13, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0xfa, 0x2, 0x3, 0x81, 0x0, 0x1, 0x20080, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7a8f, 0x0, @perf_bp={&(0x7f00000004c0), 0x8}, 0x4, 0x10700000000000, 0x96f, 0x9, 0x0, 0x21, 0x2, 0x0, 0x3, 0x0, 0x2}, r11, 0x6, r9, 0xc) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8982, &(0x7f0000000080)) 3m37.542669447s ago: executing program 4 (id=17902): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="001300"}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x7, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r3, @ANYRES8=r1], &(0x7f0000000380)='syzkaller\x00', 0x35, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x39, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r7], 0x18, 0x10}, 0x0) close(r6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x80, 0x5, 0x9, 0x80, 0xae, 0x0, 0x8000000000000000, 0x40800, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xb85}, 0x10c1, 0x100, 0x200, 0x6, 0x0, 0x9, 0x9b0a, 0x0, 0x4, 0x0, 0x1}, r0, 0x8, 0xffffffffffffffff, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r8}, 0x18) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r11}, 0xc) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) 3m37.306149442s ago: executing program 4 (id=17904): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb0}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x1f8, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0, 0x6, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0x66) 3m37.021884177s ago: executing program 4 (id=17906): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xaa38b000, 0x0, 0x8, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x19, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @call={0x85, 0x0, 0x0, 0x2a}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001000)) 3m36.926570799s ago: executing program 4 (id=17908): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x92, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={r0, 0x0, 0x0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x14, 0x2000000000000190, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x7, 0x1, 0x0, 0xf, 0x3, [{0x3, 0x0, 0xffff0000}], '<_['}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], ']'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x5f]}}, &(0x7f00000002c0)=""/254, 0x4a, 0xfe, 0x1}, 0x28) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x4, &(0x7f0000000fc0)=ANY=[@ANYBLOB="000000000000850000005000000095ef00000400"/34], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002a40)=@bpf_tracing={0x1a, 0x22, &(0x7f00000027c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}, @ldst={0x2, 0x3, 0x7, 0x6, 0x5, 0x20, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002600)='GPL\x00', 0x0, 0x5d, &(0x7f0000002640)=""/93, 0x41100, 0x3c, '\x00', 0x0, 0x1a, r3, 0x8, &(0x7f00000026c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000002700)={0x3, 0x10, 0x1, 0xcaa}, 0x10, 0x2f12, r2, 0x6, 0x0, &(0x7f0000002740)=[{0x2, 0x1, 0xe, 0x4}, {0x5, 0x2, 0x4, 0x11}, {0x1, 0x3, 0xb, 0x3}, {0x4, 0x2, 0x2, 0xb}, {0x10004, 0x2, 0x6, 0x6}, {0x3, 0x3, 0x3, 0x8}], 0x10, 0x3}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x18) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0xf, 0xa, 0x0, &(0x7f0000000040)={0x0, 0x0}) recvmsg(r6, &(0x7f0000001500)={&(0x7f0000001280)=@x25, 0x80, &(0x7f00000013c0)=[{&(0x7f0000002900)=""/155, 0x95}, {&(0x7f0000001000)=""/48, 0x30}], 0x2, 0x0, 0x27}, 0x40010122) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r9) r10 = syz_clone(0x47ce78985b32a8d0, 0x0, 0x0, &(0x7f0000001100), &(0x7f0000001180), &(0x7f00000011c0)="15b217a6d2aa6e6c54d333e699aae4b7a26422428f044a02b24d4b") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001240)={r10, r5, 0x0, 0x10, &(0x7f0000001200)='kmem_cache_free\x00'}, 0x30) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571cd765f4b9259ba43e6fc30291d8a642146c4771898030b736aeee6b247abb0784b154e104e7dcda401f9b1736fea30a41a4153fe6a9a525bd0a3487571f914f05b590e242341ade289d8f5b842c6be4a93c2755dfd47174def782a2f8f61c068b5a012f02c0801601e860def788121e8808c01fed4c920a3698d0d684920918c95b17f76bbcb4f265c931d8f79560ff8114b70f4dd6791e2ed70cfeb89905791b88be26efe1c5c66b7b50b3d2be0dbc066dfc31618f9507f6f340b85a2f76a6dcac9d6ccc289ace5e5fecd25afe22ffa451f5e365ab33cc985f2e9d7f7fb1be4794740a94215d7db14b0ffcec19e5e3c5ae0d8578ef3b65d2a7a77a11e390a6c3a6b391061c886b961e3c2f42d62047bfe1356a44b840d3d956105f4c0fa95db08c4933f00de77cdc057c28b41fecfc8398c442be1ad065954f6c9dfeb2fd7207e8548a00a1d50bdf522d2abfdafd71723616a34830fbfa8fc81e0c2639cc12f363a4919b7a00ac8189dad3e7e54122a2ef430f623658d5e281c9a19442995bb9b0e3f7d13e3016b6f9523be196bf23bbcc5ec802f43ef8b651d688d9d5a44f35c9847e4c32bce3e9ebed2326adadc76f06a195db32c80b3090d7cd65c9d8518ba4e528c5eb5c7a1c5695b21595fa8a8621734bfda8afddd65e1f37a1990220a00fa9bd2c22b0117ceb08ae6af3c944c2eca924abfddad065d1472d0c3f742a49b1e78c669471873706ad157d831d7482b773f07b0673a6ce1e227a7a4d13744bf459434c0ab1c323a38b1a84cbf1ce9741f2b8fdcc2e073e56171603d035aacd83e71d5132831f4f1e8bf517979f132a33fd03783272e9b8c96dfa4e1d320a58d82acfc8d3d53a5a52daafe4dc8be08f4ad53e11cc21374b6ff4ff5ea2ecc5d3f7c057f74f0098e57d990090475cdaffdef0da917653ed10fb70b94b72e5b4d95cbea0fc1dd2579635ad6ab545ba4d7b6d2f5442bdb78beb6c8ed62942a439117025b4566b48d9f3a17fdf4577e8606a4bc4c26557e58312fd2d1a541ebec3e5ae28eef8b2ab0597083716dd12889335570ee7839530eee879d9b137606cd4dd7103991671b4464bb68529eb19fb7a8845e3491bfbac688a87cf0744f429ea112014402915c4c1f6bae08d689d3cb7d641d7befe8fc74a2242310a9a367a39531b4c86da5b39df524e52f33ff9c40b48cb196ffc9ca855b6e698ade8a83e52b9ddc5031ff09e1907e4f8b0d07e64e1fb8e427f8819a7be907aa216bf8e2a4c7cc87ed53bf9490d4cc788b91f3b9f705e984a7e62c7a495e8421b97c39dc954b35468f17c6682334f4e16308448f457faeffff6d1f818522fa441d3a48168bdb12ffebace436a3915b63076cb6a655718647f87eaaf313b5bbd430421eed3a2215e439600a56eac8c65291eb103326a8034662bd337ab51577d9110ec7151be5cc9c54b2a30891acac5ad006ed537dbeb8f16eecbde7cf4e71373faf3c36b772f6d7ea9346875c8cf1049d49d4f8eb01b946c11e8c8e3ab2015f282167acddcc77fff03e1be9134252af0abfe538b4d25fc4ff874b52b9fb0996b5f32b4141dbd30578ff46e13ef6c63fc1620f62cb11a3dce401993976c272a5f62fde3f2a0e654d19e7a39dcdb622b9526d2a15cc18e6f817c916a00775353dd9c8954e66d0445b59bb0f5e6e3b46447232f52a0e398b057d123ef503afcbd48544db6434d2025bfc8dab72262a4fa5426a03061e7f8966e0086ff8ab5a91ab59f19b830394ee8bc76d6fb4816b8f4cde35b7eb9d3811228d51c54828f97fd1e648196c81bc73ed56249a59f318704e84656a6cedd2b8c1e1808d1cc648749abc643131e494c01336d4a14b8609656f2c972dc23c5c2e43fe40119fb88b5ec2aade35c03646e347354c493de8ab3672ccf94af0df333c6678299129d79be0eec281c5b3858ce3995566a390b674635b356692e3e9c53a089638ba0d69e772b7b410a5ae03de12e7de755ee559e1707b7b8003aabc8e2ce03c01e3183ff2d93262f6d5ceaafecdae66bc7cb3952c5a6571d864d502f281db5a228695badca5d022fdb6da56ab15dc377d1c1f8581ff56e28c2b2a84edb629547d28275c2ed571103b4ca7cdeb0776ba9f9dffcd78d21c3d4caa9289ed199672f4e7b912068c49c817114c37d37ea03954bae87d1ddae3da2ad85feb2fbb735b75a51f7bee5c8d88cc7bf64700d1a46ec6b631ae22ac7b06730a86a26bdcb992e1c7b50142de96b14a8468e4514068a30896fc677fddefaebb125c693a8d460469c7fe535f844781940f66d6abd091191c3122d584f5b0f5b0d443713d7d5186124d73de28aca30b719d4a55e09d259bddbf16995aeb1000880890afbd24d4066b0398985a40999de22ce176348e1c1f57eaf75b92a1e4f1482e89a00ac2cc36b20e36af9ec310599c19a5b1d6f8fadba104c58c801c6633315f82ebfa88faddd0b693e2f827f586c1cc5538e93bcf10f81af6dd7ee727df3b5018c0b4e31e40d040a47503b6ace4d29a1162ce487351825255f5584aff7cbd421f85c3d9fbb3784abd9848f16028b68f0d32ed8bb80106e8cc4acb939ff88bd39976d166b2addebf628b3fcd056da2f60e1b90f7a32702954921908ebccb683622a1f574ceba6951bef5e751c338c8279318dc28e36b9fc2bb17c3ad08aceb00fc388e6db112a738f86a4a1eb11526e1b9d73250b326285ed47c4398d93a3933d9a784249b65ad7d78a1f81d96ef36493ed693045a2150a8eb43cecc0c93e7d20b15b39a0646b081c2923b816365b7fbb41683a41732d942c5aa12faf876ec7f036becde8f3295af6dacff38d076d8e06260fee167703bb610745374a2758a6b88e465ca77d1f3105ae8b6b04a1eb509fb178d6249dbbc84d5d1d069278449a89d03e4a9a395d8170c329a296cfc329798cb9b9f1078d098cf3f989fd4ec53e013fbe917df35292d44fb1f3da4da4432a1847d4721514ade8cda5e5c0b51183580fc35266a970ebba74faeda56d4dcb56df51f96ad237452cedbd0cb2bee112713c3d450835811bf3da9745136d428e148fd0932dc77c8d8e61a16c625241fad8425b4ece394eedd5f165bd94923bfa1172be8edc8a4fcaae5f77ee8cc510192b27964da09c3e84efb4bc7154da1a24da8b7e544b42278d2574687ec76143afa6cf193d52a2a7f4c20ee57b6056a1337d5e408117a6cf1ab49c8980f39597f69902085d3e8d374d44e6ab4ed1185a26be2bc7281e9cfbbeb6bed899aa1924d3faa06d95999fbeaf2337494e0c2c39eef5a73fcde84459a9ea48d4e015d9e5bb5839354967ce02f637bc8678d2595b9a918fc36b927d7501f0ac2e3471ce02b5df355689c87f191ef5390900a41deec29984e45a878ece964b0009aad561316fc3b30ce1b49266d32eb17cd30f3e17e1f59014e8c518940dd0a093d1349c1a7c2581963bbe0ba372b6426e81c33c71b2ec8141c5713e52a37fff0a417a5b259e1420d9fb6a731f5baa0cc494221947895aa8fa14745a986a366bff9d0c239a19f85372497565b5b703da16439019df5f3d29f4247fb528854c9648630f03e9dedde5a08a47728ea6a4d42e62eff6fa3bd402325e0f4387b60171c37c180f958ad80955779c899517e7ea76eed00598e01552eaaf08b723daf9d466e8c57af43a15a46528b1119f5074aa3c51f77357ebe158275bc06b89640d7ce3c0a03af01418d7dc6ae8a1be8ab08c1722d66d1e9277480b8b178447667c024f9b78f8a878a2d7cf8e83e5104f6964b2907a989abafc7d7d0df941abf3d7283b6a11d46c2911a42182ec27ab785d92946e1ee8ef44846d561850d2a98c305c382f36d4cfc9b2bfd3b86ef21a0d187adcafbec8268c7d662a34dda1c83c4967097743133bc8c587edf249f5668c34ddb112fa4eb1bea9c8f6a000f1f34428b54688a5e214a7919868b25dbe930e86a243ecf54afe0b518c647d04873d2cf62cb2ab27f00015537a4fd2ea3dc8777abdf3284622347016566da0b9c406ca8c40694e4013a53fbf2e803d51b0bbe5e9df5fc74f66be618856357ccf803c53ed0e3b3fe79f69f0ede9b565d8f7a8ce5aa8cbb4e8fa61be3fd00ffb07e45065498925c14c0b311942d4ed951ad6237aadb5405bc7b2d79e1fd295b7c2ed8efa883e44c86a5053e2f421c6d4dc0c47d3a05d911db37d6efdb8e50fb3f06139ac147bc7162c21aece79eaf72e9779f19eb5395cec3d15a7594ea70a6b373d98651d2215b210f037ea3f8a57ded74474f6fdb64a08b56af52168da70b30aee03472cd8bee5af04cad7303004a4aba464b99", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r12, &(0x7f0000001140)={0x0, 0x2000, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 3m36.406266979s ago: executing program 1 (id=17915): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000c0000000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="f4ff0000000000001000080000000000001e060000b39375c9000000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x16, &(0x7f0000000b00)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @map_fd={0x18, 0xb, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x8b}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xf}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x3}, @ldst={0x2, 0x1, 0x6, 0x3, 0x7, 0x6, 0x8}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000004ec00"/22, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffd}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00'}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r6, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0xc, &(0x7f0000000880)=ANY=[@ANYRES32=r1, @ANYRES8, @ANYRES64, @ANYRES64, @ANYRESHEX, @ANYBLOB="54ee5836c81590005a9a6a95eb12280d71bfc2a79d3c7c8107e69be5a381d00b65e432a3872b436dbcb23c60946eb203ae3a7b24554c18fdc214399a05a9c3b3be0cfd36a50ef26b17d18b281c3bd59d9608d924e5fe1dbb552695910fba094b6291f8638c7472a6cce9caf17166", @ANYRES32=r4, @ANYRESHEX, @ANYRES8=0x0], 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x1c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x496, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}, 0x20, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_config_ext={0x7ffffffffffffffc, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0xb) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='hrtimer_init\x00', r9}, 0x18) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r10, 0x0, 0x16000000}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) 3m36.36947251s ago: executing program 1 (id=17916): close(0xffffffffffffffff) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001240)={0x6, 0x8, &(0x7f0000000100)=@raw=[@tail_call, @map_idx_val={0x18, 0xe, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000140)='GPL\x00', 0xfffffffa, 0x1000, &(0x7f0000000180)=""/4096, 0x40f00, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000011c0)={0x5, 0x9, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001200)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], 0x0, 0x10, 0x2}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001340)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000001300)=r1}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001540)={r0, 0x58, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001580)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001600)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3}, 0x50) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000016c0)={0x18, 0x19, &(0x7f0000001380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5}, [@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @ldst={0x1, 0x0, 0x6, 0x1, 0x0, 0xffffffffffffffc0, 0xc}, @call={0x85, 0x0, 0x0, 0x39}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x7d0cf244edddc0c, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfa8}]}, &(0x7f0000001480)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41000, 0x0, '\x00', r3, 0x0, r4, 0x8, &(0x7f00000015c0)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=[r0, r0, r0, 0x1, 0xffffffffffffffff, r5], 0x0, 0x10, 0x80000000}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001780)={0x1b, 0x0, 0x0, 0x7, 0x0, 0x1, 0x4, '\x00', 0x0, r4, 0x0, 0x1, 0x4}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001800)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r7, &(0x7f0000001b80)={&(0x7f0000001840)=@l2tp6={0xa, 0x0, 0x100, @mcast2, 0xf94b, 0x1}, 0x80, &(0x7f0000001b00)=[{&(0x7f00000018c0)="5f133efca844a649857fbeedab8762fdbc8aa1d8f4dfdec0090ae679f4eb8ac3a91088d8628074bc02723023a34ce088b5852505a657a3edf884907f8b970fcf9c945ee2eed7c38977ba52545264bd9bd7a49965baebe85917bb2d3e7986a0129671e6f1d9b125d1c02fe50bc9982ba69b506fb48c685c3cb12771ef6bae262f27fa7f175ab9925a17e2ee59698d744eb9c4fab1792987f4b4c2b7c7ced87ba1", 0xa0}, {&(0x7f0000001980)="1679b33c65e0e56849293a5344b912124f4bf3c7ff05fd5587e26f0d54ba8dd272bf53762e67361fd1fd4d39827fd5", 0x2f}, {&(0x7f00000019c0)="cde31694a1b043f30c1ae02add6388a8c297a00b9316f32d087d5393d3f481a6b11c0d2e8a879603a76e0e6fd4e5aa2ec3e0eaa04d77bec2653d5c1a6bbea31ac807f8d5c5fb7c759a66d7b161a964e6b0c5107a24b7212c2bc377609c5abd8eaf5236df3ae78853633ccc", 0x6b}, {&(0x7f0000001a40)="51f55f0913784855b555360de0b2d558ca61cc0b5e5b056fbda1daf3b402a3df5ac082296b9ea137175603ec70bd8443d18e61693472b7e1d102d912670d53ceea7246d249d58ae734df4723b8a16320bc9ba52617787329bf267d20d7fec7b02efc2573ea9209334b0b28f25be2a584ecc55b989d7ebdd613f3fc7f2f8a1bb8e7746be1c9ba233ad85aba552fb979081c02c7900a7f52285673fe1cf18ec5be064714522d13ff0d8f5d95bf402163fad5a23cb69c81607efb892e", 0xbb}], 0x4, &(0x7f0000001b40)=[@timestamping={{0x14, 0x1, 0x25, 0xf52f}}], 0x18}, 0x840) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c40)={{r0, 0xffffffffffffffff}, &(0x7f0000001bc0), &(0x7f0000001c00)=r1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001f00)={0x6, 0x21, &(0x7f0000001c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_val={0x18, 0x0, 0x2, 0x0, r2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffff362, 0x0, 0x0, 0x0, 0xd1300}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1ff}, @exit]}, &(0x7f0000001dc0)='syzkaller\x00', 0x4, 0x7f, &(0x7f0000001e00)=""/127, 0x41100, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000001ec0)={0x1, 0xa, 0x2, 0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) (async) r9 = gettid() perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0xff, 0x2, 0x3, 0x1, 0x0, 0x7, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8000000, 0x2, @perf_bp={&(0x7f0000001fc0), 0x4}, 0x2000, 0x537, 0xd, 0x3, 0x9, 0x9588, 0x2, 0x0, 0x400, 0x0, 0xfffffffffffffffe}, r9, 0x0, r6, 0x1) (async) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000020c0)=@o_path={&(0x7f0000002080)='./file0\x00', 0x0, 0x0, r7}, 0x18) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000002340)={0xe, 0x18, &(0x7f0000002140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002200)='GPL\x00', 0xff, 0x76, &(0x7f0000002240)=""/118, 0x41000, 0x11, '\x00', r3, @sk_skb=0x26, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000022c0)={0x3, 0xd, 0x2, 0x7}, 0x10, 0xffffffffffffffff, r6, 0x0, &(0x7f0000002300)=[r2, r2, r0, r2], 0x0, 0x10, 0x4100}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002440)={{r0}, &(0x7f0000002100), &(0x7f0000002400)=r11}, 0x20) (async) recvmsg(r7, &(0x7f00000039c0)={&(0x7f0000002480)=@generic, 0x80, &(0x7f00000038c0)=[{&(0x7f0000002500)=""/67, 0x43}, {&(0x7f0000002580)=""/84, 0x54}, {&(0x7f0000002600)=""/189, 0xbd}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000036c0)=""/169, 0xa9}, {&(0x7f0000003780)=""/232, 0xe8}, {&(0x7f0000003880)=""/47, 0x2f}], 0x7, &(0x7f0000003940)=""/82, 0x52}, 0x1) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000003a40)={&(0x7f0000003a00)='ufshcd_exception_event\x00', r10, 0x0, 0x2}, 0x18) (async, rerun: 64) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003c40)={0x2, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003d40)=@bpf_lsm={0x1d, 0x8, &(0x7f0000003a80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, [@map_fd={0x18, 0x7, 0x1, 0x0, r8}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xe}, @call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000003ac0)='GPL\x00', 0xc, 0xbf, &(0x7f0000003b00)=""/191, 0x41100, 0x24, '\x00', r3, 0x1b, r4, 0x8, &(0x7f0000003bc0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000003c00)={0x4, 0x5, 0x6, 0x2}, 0x10, r12, 0x0, 0x8, &(0x7f0000003c80)=[0xffffffffffffffff], &(0x7f0000003cc0)=[{0x0, 0x1, 0x1, 0xa}, {0x1, 0x1, 0x9, 0x8}, {0x2, 0x2, 0x6, 0xb}, {0x1, 0x3, 0xc, 0xa}, {0x0, 0x2, 0x3, 0x5}, {0x5, 0x4, 0x3, 0x9}, {0x1, 0x5, 0xb, 0x3}, {0x2, 0x3, 0x5, 0xc}], 0x10, 0x5}, 0x94) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0xa) (async) perf_event_open(&(0x7f0000003e00)={0x4, 0x80, 0x7f, 0x9, 0x3, 0x9, 0x0, 0xffffffff, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0xfffffffffffffffb, 0x401}, 0x400, 0x1ff, 0x8000, 0x1, 0x8, 0x778, 0x3, 0x0, 0x1, 0x0, 0x7a08}, r9, 0x0, 0xffffffffffffffff, 0x2) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000003e80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r13, &(0x7f0000005140)={&(0x7f0000003ec0)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x2}}, 0x10, &(0x7f00000050c0)=[{&(0x7f0000003f00)="786e466d582e82500a1f2952c692cf8213d1f028e99a7c49c69ece37a7e0941ba4731d11aed9f196bd43e6e483c401c2228866ed92e52272e881d5f09429a34dd2f6c543f5bc3daa56d2d878c67313abb920283df3a97e11b88ee1ce6841bbca5d5e531ee5340b2bf2d5c2d60d619695f3e6e946064292f4b5952af139bf2e1a6cba43baf3d45a925b13bcb398847980e53e336742f70841845834aa1f30ad5d4100b488b8", 0xa5}, {&(0x7f0000003fc0)="ebeaeffd30a320aa33355874031389c97a0d41e00db54b2730ff5d47f39414e2702a7f40cd362c9a3829afaae8a9eb45b51dc80dbeb95382a3c1f6cea8ebc6c4f55619a7ad13d19203946dbad50706657a8aa03e7510a1a8464d9aec628d23c9c27fe5388ba051c970f8a28d7827ed1bcc3e7a1ced0c8ba62f67c5de936ca75c2c78ef2173431fd667de02c2c96047ed4e53db6a44c6e5996c294917606838db90c87503368f3477d4958a1987074c1feb37ca4b2142b1184bc5a17793666ab20442f9b5f2385364ec82cd204df723", 0xcf}, {&(0x7f00000040c0)="41e09aab6dd23e83cb6196df2d479ba06c2d3973461a88548ffcfb15fd6273b4b496e0cd8a4986cd0b60df6d7ae69beb3e6955cd7c45e3f1ba695bafcd6240503a8444ec918021017772a9753e3f2b623d7896daad7f0419c1b7782b0cc0c7080748a21ff5661cda6c60c39dbba6d5172f83c01fc2dbd96412236722c6d03ac9792a7968932be5d996d9f93ea5e5f79cd00f22be8237779331fe15a0255fcb8963aa703dce0d80c143e3b789b92d20a843c520090176e5ff781f3a6d83964b75d3c38ff24c8d296bbd5f33242a26830df4b0548560d476e1579889c04b6cb55d8bb8237735ace51a02e3470958563f148990def1c5c4ea3cee8a110fb03050d379a0968654f8d80a937cf93e8ee0bd7530c4a59b6e8f5ba5705e47b85216c870910056ddc118104d9785b839c054344b2c7b09f379446aae0afe095d7f33757dbaa6ab1097daa4360fa09d67dbbf38032747e5da8185670b477eb43b6af3d456537738c4f4193948d4b48cd3bd68d484bc9fcd1ca0daa45042af58cbdf3fff0ac24eb46e7d03db8eedcbef77f1b2bb29c7a9ce9a12c7613e4d99ec83071ff2387dddc46de5b237d5db2592298395894aca30e09cd80737306c2b8ca3cf6e4ae9b5027f738ca537dcce210a013179ed641c80d660845022962592673989a5b0244b6ac0f62da62210cdba26ac890eec9a9616597540a5a587a87b0a34242494ba31769d6998f42caf1b81f7b86cdda840f4ece3b55dbcd6dacd5ddc412cdc3398df758a8a35dab9a4bcd1c68094e2df3e73c7908a5495ae9b671f8d0459ab8bff974ebebb0cc4090b259d65731084756e33addfff75845d71565c98c0e1690b7ae4c1f253adc008336cdd5ee282069440848deb7edf7d6ec944d0ca8a35301c891a9c6c576626a7afb0211dd2b27a2b3d73181b30b460f496f8497abdda3203f5ae0b95601a34c8d9b0f70f2ac2338130b113b771eceacbf88c54509fea4b9d90936d4fd602f5e1a4912fc94849a4867a6c7621414e660a4a003543d0d16c42668f96e86a8c6a2ab8701fd00c1e804181336d29422da539540fe35b4b0b55984f4506542783c167e86b6005c36145cdd87f51809fe07ef4a5ce55ef7b4fb7527b0384de30438627943a00810768b0e9274834faeb5fabbb103d459212ec49406bf7973ec5373ab0b17eae28e55a98c01590753f837ff600f89637ad15a46057ee0ec93434f74d8ff0ee509a26a19ede3c3f895d61e308667991b496b0f94b762540da6aac97efcb064ffd098bde6a7b48042490e59cd1d5b2aeba7f9c0527f8e5e41e29b30a5897043696b1557d13362a3d94e617e5823f105765327a1e9689d5a7e9d8ac8b2633a0ad19270e07bfcf592f6089efb0a6462353e9fba88749af49c820e59f452af5f715f0ad35838c96090f5d30fb31eda878515ca2d82b11b9bf5ef8db0ff4647a1579a10ddee0959f627f26a32d2fbbf1d314f803d432ac2e83daffc50d44185bc3c6d85621f43c1c6ffcdae56380651d4c26a1390bac18d43592082a289181bb88ca63f21b20d8e4d782500d7f6bdcc2582c88e24d0aef52f28c2edfd878aba51b798ef01af34ca14bdbf27e92f0ce275c4eca91c602d436beb1c914923b9cad224b58342a93d989eaedd165be42458b3225dc0262366a6a1397c3df9ca9a5dcfb4f132d8f207b962b93c41d9e3767caed60ce5692bf898d1aec30e794d8eeb5abedb548b580b3d70e629367b72afaef777077a35d3e2348eaf69cb8f0165856f64570bcad23b2862261e45199ff3ac0ed4190ad876886824415a5be4b2ffac6596f6187640bad416ad3166ac8f9c05d0769c941f7297e2633cfcffca522105f8303dd404c79b9269bfafc4113734e625bf90aa9278e37a2ab05e54471ceaa1d8e6cf7ad588cee9a08a2bb4a58cecbd5ca6c25aefe70b9272addd6789041d2c42eb8314c4492d8c7d2440dcdbf566c51747069093fd145c8a4cfb922c1191863625cd0d2fa76ecfc7ef2acb5733df6acea68de6a2074d34480822c969cf9f3f609e04dc25cfbf780fb88d6475e93aa9d7333fd29d2f07769a4f4c7f815ecc658b83efbf5f7309ec5cca44991ca9d3e68466084664200f7d818e8cc40fea7f5003e757a0282c7ba6c4d0e868154c1ec0a04b0c50cc2d41b986b418a975cf2963ef783f2e62a9a9eb1bfd8fcbca3cd6e0a1dbfa2dba6fb9582e953abc2f5ee2d610a2090d748b6f9d7559359bfad4c6834b26cfe86c8962802efbcdf9b863e6846784ba6402db42440b20935e1765e77226fea0ecfd96945adf8007eca3fbd49e04e6c79048e94101ba7508004a74b33a6d926bb057ef1c05ba2d1091a11d8b12f184cc78bfd7beeb5c57eb51da32737658a0396db7f134b218e871dd546f4f97f774d5bf98bf959aac6d18fab0179bb4b2391c39acd4c4de90c2968afbf0a38c5170123171c1e91c345977359e9e41422a783d0c2f7cc675c7696b8dccd664a61b49f94aff91b8ae1c6e94e8b82443227251b77dd39ed32cd0310ed232bfa9ee75a18de542d3d6a472b2f5f29cfc4bc849fc6da84a5b328b99ef0bf909492821af8d308585c59d2a3e57cbb62ecf0dea4d181c4ee166cffe3cef14b49d605a35f7a2228aba97b1d4b64d30d799bc1ff568708f82da8b336685658c781107125d192d07273db87aab0800e6a46c4001a504a18ae712e0cba44eb774d2626b8aab6a9b667087f38175c569e121d8e603a0d2922f6ee19341e9abaaac326eb4e44c5d181b1ee676dad53c449d275a312cac4eb9dfb5a6a442184889d4920edd43eea0454de082da513202d1af628052c5cad36810b62e962e73693feba35730148767f7755ca39e4c8e64f234b2b19c41334ca9209b523cc5f0b64f280eb85753a3b0873ded4d8316d2d56da574cb7d698111a5842b045a5a70f3bf3277516951c74c39abbd2b54379f45de7828a2ed3fac97a7d394a595332eb8cb2bdb909e2f01d1a4c8447b5d0d94cf154739f0ac210a80f402feb80c413888cef6b696b31fff6d979ee23c84765f64152156b4e7f7c439034ac186f700994042cd16034f1612471daf0f62728e40fd74436fa728fed5d22a83c309fa73b07183539995bf7a6b258cf6223a33d75d1a3f08b3a856370b3b0e0518a58ad1ba55442131132ecf2183165a28aee7b60c8d409a1f16b207a1711c05a5df9ee01b6f237340800b75c74f9fd0c08ded717acb4481c5d5caa66d27a1552d5dd8406566d6cf8921f13438b82258c94ae7d7726dcf39e816441c15dcdcc0eac20261b7a56bf891657f09bb0133e6f5ecfd768eca7af4c11592bb8c3f8935cb39e1ca0f08b15c34ff17834af680f2c3265e335f8d4da3d40fe3b0a16389129be34e89edc5cdf789f99a8a96ac0ee955d28eb0b3fb7eb193a2e27b69ebdb3fd94d7f00003e601e3aafed19a7416998c08714214ef11bf8ebe50139632a636c80663270bb201238e0cff15ee68804b53e6abbcf29fda25aed55a5a4d2dbb51fd0bd7d9a6cc296b719cacaa34028422542c11035d9cb4be89d7114d3d3d31dfd6d096a8c04b3f2130c8aa16d624cd78c9d995114a57540454c3693bc48596f0ec263dfd71d257786f08aba16f38542b04b9428ad8cba03fe19ca4e9d82f297d7ff7d8cf0100c426138b56a32bc6b2abd53b51344749944de78f43b39dd2311ea159c1b70dfceb61e5c012a1a2383a4e5d95986702ef13d640dd1305adfe4172c450ffc4ee99eb54c6c2b538771289176502efa215f5b7b32c2f7531bac4c2029fda02d0fb4732df6030d04a9c79397986b2d851e55eea688b117df89a14f150e3e55ba42da1a1ce7998a04130b07f2b7d7ed73c73fd0774c298cf0fbefea8af37d4aabf447f8f468f19065a5127a6a975c5523ccfe71f3fd7bf1b28edc537303ac39d1b9761c8861fbec87271ae1721d6fef97ab89790761ba2579774f9cc0aa96881d018628d8e9eb0ba0fed1d54f9148f63b3cf15c2e3b3f46b1c541f18a5b55c665e302c0eb351148997020994cb076e733898d60966187facd0ba3c860d08ce2953ea3980c956e7469f2797cf3e277f30d864c24507bf426a79741c4d8d233b1a9ebd705c0c6960f157912f24cd0672cd76ebcb8c89d62b03779644df97c386290a1c6cb441ca832011e1ce0232616fb16bbca2f77ff0ba5b890e950d962c24cf78417074aeb77d8ab1a803231e8348c9909c017bdf0e77d4aa576941a9e9b2677619d0dd80145c41797a7eed3d0c5fbfb6fefb6aa881bd41bdf90fdaa43d4cb6533fb6e802e9d590b59d045ec438ac05b20aa821574470d15fa518e4e0283925042db9ba1f831bb846fff44520f054247370f3883c63f90b083da86e5104eb69097ff981347f5f9e9f1fd9426cd2c75fc4fae4eb978b6361c6d433e86a9c9e163384d8f8392ec29682f488b550e79edf73ab3e3ed48dbf220b24be87bc64657da2abbb3ab4106be3dab2c847514666c5f2695db03ea90d49c986baada3c5df42cf76aff2a0152cce2f3e49f0b4d315ba7053b1ba9bd00d37bde313eda38b2326be67a804dd3f035cfec149e36a2cc48bd2685547b48ccb8238b0e975e86e820db829875542a1c4b04bbde180a7abd9547c6bd18409b0898efc3d3c818c180f30bafe31dacbd95208de3732886057169d9bb22a1f741466ce2bca8f5541aa94503253ac769aefe5b2010f2543625fff769902342e7db7522b7644a8a47cf49b1469f3ff3918566a535c2fe352e317572838f19f3858f39b878c6556097d3070e2f626c26a0a5554d5d375ec55bf689519ceca154e14dc865a0a7cc1925eb8686ef7d638cddc8548cf102879b79c4cc7194db86d9feea87b8738f9ca6efdaeadc4f51e7711015232a54cd31b86b5123818dba580150a20c1fd886bc456f983fd68a5aad47b108317ad5e54b3511523bcfc8a81adb0c31faa7cd01a0fd607a546634943c461b0157e221467d4b77c5b3cf9f883b6112c6da53b47909d79432dd5e471e920124f8cd09a70ca406fe3fbc97aec5df6b1cb8634dc177344c9b585268edf0c26d9d7f19f18762feeadd88a7324ed33cf8b8511c48f0a6a51ce2d14c6759069dfb442daf9cba5f532e5b1dbb45213655ea8bbd697274d6b0a889030cdab67efd9a2212d84502491c31b412a3522ed9f471aaf7b26b37beb5acd7df98e9a46888534d22f95cd59ffc1e183b3dddcdeeb5e7430d590500cb997cbbc87b5d1994639a11e4d471ba6113c3741c40d72bed9090f9c64b4f97a80bc862253296b9cb39eba44cdb744f21020153e97627113e4e8a808d0a622d21ddb6fb67ba15fa746bb61c02e03842e9962611d6d6b38cda7f3030bbe5f47a9ce15787c5b9d0b70a8765727583bd4799080514c58e8463823a3bce25cc48d7d84b8e4fa062288e29461d3f0cee2329d6056aef57a11f9f73453db65a274d7c860a4d61b5b982b4e7589112d49c2104debeaf879066843e161ede864cb68f509e277befdc00c6e51444029810ddf755f80f46bdfa6ce695d910e4eb688fcb01bb3e605c5d57a68769915e10a942d28c2a02fbc2c7c70279c7ab602ec255b0c1102a33dd51ec747cfde2477cb9a29ec80f00c7ae313afedc2387e9195b9d5d480fd1ab967b1a7039881441464f03a876e66d57befb86df736b202b296ca27c1c0b3a37fcea6055a474cb1c52e509fb74a4bd478bb7e94ee1715e5a9093bb63b7df9075f0fcb31605745b8f4553d63ab1bc554ca8ab57379b1f0bd8077e856c3403ee779d54ac18df00c9eb3", 0x1000}], 0x3, &(0x7f0000005100)="e130d6cd08b702ad098f4425f39a4bb34dad375d543bdd5b3cbc9604f0e4c4883f9c17", 0x23, 0x20004044}, 0x20000000) (async, rerun: 32) r14 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000005180)='cpuset.sched_load_balance\x00', 0x2, 0x0) (rerun: 32) write$cgroup_int(r14, &(0x7f00000051c0)=0x4, 0x12) syz_clone(0x2242000, &(0x7f0000005200)="bf9038fa689b45259bf3ce243792136e5cd1f3f200907b2ff9dde6f0010244e754198a71dbac2d87e04d62c276588a789cabb0bf17dc9cdaa0bf1a0af96544185ce39dd495a3e09cf38f8ba3b573c93452747d52b380bce6d4e22c9781c18295", 0x60, &(0x7f0000005280), &(0x7f00000052c0), &(0x7f0000005300)="45a6c1e19bbea1ab70e11791ff704f2d3550b704f751575d4dba3148231c3df03a615455590a37de2bd74b771eb321102c4faa014d2f2d48d46154251137bbd571d8b5a683e61cdc40bda08c48a916aaf4c5f10553f61e7a4caf0e54cbbf74aa022fbfa1c24f2b6d575414947ccf63c439255cae0fbaa8ff99213cb1860e9522fdcfbe579939c1e35d782e4d61dc501e8d2d1be6d992e987573f523e2302002ce2c95ed187b42d69d283df7c1a286449dd255752e4b6de71237d0ce8633a36d4627e6493c546dbfae37902e51525f9c21fec5708ee2cd821f64df658437a1a1ca9eaea91") bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000005400)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, r1, 0x3, 0x5, 0x3}, 0x50) 3m36.318277191s ago: executing program 1 (id=17917): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x6a, 0xa, 0xff00}, [@call={0x55}, @exit, @map_fd, @jmp]}, &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0xe, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000440)=[0x0], &(0x7f0000001800)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x23, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3b, 0x0, 0x0, 0x0, 0x8000000}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ea3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @alu={0x4, 0x1, 0x0, 0x6, 0x7, 0x6, 0xffffffffffffffff}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0xd}, 0x94) 3m36.271640072s ago: executing program 1 (id=17919): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0xfd, 0x9, 0x76, 0x0, 0xffffffffffffffff, 0x52004, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0xe}, 0x1d040, 0xa4, 0x9, 0x9, 0x2, 0x9, 0x7, 0x0, 0xfffffffd, 0x0, 0x6}, 0x0, 0x0, r1, 0x19) perf_event_open(0x0, 0xffffffffffffffff, 0xa7ffffffffffffff, r2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) (async) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0xfd, 0x9, 0x76, 0x0, 0xffffffffffffffff, 0x52004, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0xe}, 0x1d040, 0xa4, 0x9, 0x9, 0x2, 0x9, 0x7, 0x0, 0xfffffffd, 0x0, 0x6}, 0x0, 0x0, r1, 0x19) (async) perf_event_open(0x0, 0xffffffffffffffff, 0xa7ffffffffffffff, r2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) (async) 3m36.096100035s ago: executing program 1 (id=17920): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x6a082, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'veth1_to_team\x00', 0xca58c30f81b6079f}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000900c0000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000400000085000000060000009500000300000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}, &(0x7f0000000440), &(0x7f0000000480)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r2, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)=r0}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() r6 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000001ac0), 0x2, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001b00)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3}, 0x50) r8 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001b80), 0x2, 0x0) r9 = syz_clone(0x400, &(0x7f0000001bc0)="a123ed4c4a36121b8a8b58ec94f1bfaf52e312d9118c60035e67b00fc3834f71f2da7d0e08687c9fc281f8e84f4d99b807a66bd2ea0d9cfc45f11a1cf1efe476a3965373a377a167f626439dc955e6496c64e7ddb2b3e085606ff1ffdd1d8dbbf577b3bc6e17af111ee272c2d0a89d8b96d525b2a63a7a9a52dccc958419ff7351d3442922a973fa7d80fb3f8e1119ab629030d4f54a52fce0d74de55c", 0x9d, &(0x7f0000001c80), &(0x7f0000001cc0), &(0x7f0000001d00)="beafc06e3f9309d0b3642a25f7e9fed8ba2163fbec3ac9c5c8fbf92a0ecd7f01b49483239db7902d72c956599bf2dfa15d86ff65f0f6dd8d688758e1d08dc6df97f9153d2bae139fcb984540c3fe3af52631971f0448d315730fcf1341f3b21d93862848c9948f48dd9e0bec46425a06b5223ccd875fdae3325de0bec93134a0f332e5ad2f3d8588b758e441f63f0e4f38dd9fce4068edd1ee3266e6") r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001dc0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x50) sendmsg$unix(r4, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000600)="8ea252f51811a30ce600e22647a4a0c040b8ac06a052ceee3b51f28cc0991495f304e4f51de3b10e38ecaae90e44c9d8d6948dde1c920ecf129e", 0x3a}, {&(0x7f0000000640)="bf3e61638b092cb62a4e122507907e850870fe1fc864493cdf5538ba91d181fe6ffeb1adf71d77f86045de44012f4fa824511dfad14341956b81c3ccb14bd184a5a2974da7815978485efb1ba17743d4289636c9b740672414a8f11110dcba0d1b935655aa18877e7c43cbd2a815c792c27dc3487888caefa6ccc6451c2215e030228a14a056ccffec1b4ef53197bce4746eace68776849e270a8ac95a0b7ff0e76bc514f9fe56583ea88bd7755217014de1e5fab3a45b9dba16a7ef0c8800d9ed0a178e1f5cc41112640f446d39ec844d867f730c4df1fcef7cb4855825", 0xde}, {&(0x7f0000000740)}, {&(0x7f0000000780)="b8507ee36edea64e422a54a3c0b72a5bef75134074ff59d2b9bbaf990072b5c616f6f1c31801285f8c40a55a9f5797a1cd9c046f7e076f7f4229d89dcd66c92243467378df7f11a377097aac46f3ea6f22425fa1b859ddd9c30479fd2bc5e9d572810cd99011e3a30385f5ef98cabe9242ac988480323178e66834c2d1e4dbf8e8190da7b6f16ac08382fc742d536bee8d36a7ba54f893262c69960184efce02d8ddd73924db7a6ebaa99860", 0xac}, {&(0x7f0000000840)="8bf0df797312f6159d32621d11c97f68fe6787f5ec3f05792d0ec8d69c8fc1637ce2dfe50c85370cf560889d51af00b773b9c687629cb810a90d1e901b5a3ce476a9cb9a6a580bb5eedde8c2ed0b65777ba39fd38012a25a8b4ae2176625ed15872107d1cf3c696440fd820d5932d9463ad34f70ca47d32d46", 0x79}, {&(0x7f00000008c0)="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", 0x1000}, {&(0x7f00000018c0)="fcda19a9414637f1ac058abcacef21a592a725e9c5e2cdbeae7f8b072fbd81c2db7ba0d294f57066aa47d30a0c95a033794eeb2866b57e06ed4e2fb0850963494e3eea1574ba6ac92574e9d075885459dfd1799363a61607055bc510cf90741d3db1359e84dbdb378894bb891121cf6c2fc338d890c4fdae60ca56099cf64fd6a9589de08f2db522780e66a35e7bc44f7d49ab9b70b12a232d3897fb0c95e7e7c85fe12c34334cbbfc466e396e0df22522d775f1e83e7409f20d4ac55b124c859aaa991290ad204255327044a0ae348292c91d6474fb565486da46304acbe86badf4c2", 0xe3}, {&(0x7f00000019c0)="7192a465b99f070ef561efb88b665e829065fb5ae0d6208a36512258e3b0e4716608042784c14bee65627ec7f5aea7e1a6001ecd525a296e02e4390d026d08632e09da72439a02ee070dd0e5653b3b9ea556856cce225085245e8e0b9e6ad3de39b0a8f9487cac89", 0x68}], 0x8, &(0x7f0000001e40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [r6, r0, r7, r2, r0, r0, r2]}}, @rights={{0x18, 0x1, 0x1, [r8, r3]}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xee00}}}, @rights={{0x18, 0x1, 0x1, [r2, r3]}}, @rights={{0x1c, 0x1, 0x1, [r0, r10, r2]}}], 0xf8}, 0x40005) recvmsg(r4, &(0x7f00000034c0)={&(0x7f0000001f80), 0x80, &(0x7f00000033c0)=[{&(0x7f0000002000)=""/155, 0x9b}, {&(0x7f00000020c0)=""/214, 0xd6}, {&(0x7f00000021c0)=""/210, 0xd2}, {&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/99, 0x63}, {&(0x7f0000003340)}, {&(0x7f0000003380)=""/55, 0x37}], 0x7, &(0x7f0000003440)=""/91, 0x5b}, 0x10002) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000003540)={&(0x7f0000003500)='kvm_ioapic_delayed_eoi_inj\x00', r0, 0x0, 0x8}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000035c0)={r9, r11, 0x0, 0x4, &(0x7f0000003580)=']+}\x00'}, 0x30) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000003600), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003b40)={r0, 0xe0, &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000003880)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f00000038c0)=[0x0, 0x0], &(0x7f0000003900)=[0x0], 0x0, 0xde, &(0x7f0000003940)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000003980), &(0x7f00000039c0), 0x8, 0x65, 0x8, 0x8, &(0x7f0000003a00)}}, 0x10) r14 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000003b80)={0x3, 0x4, 0x4, 0xa, 0x0, r10, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003c40)={0x11, 0x23, &(0x7f0000003640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9dce070}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4}, @generic={0x3, 0x5, 0x8, 0x5}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @generic={0x8, 0x8, 0x0, 0x4, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000003780)='syzkaller\x00', 0x2, 0xb3, &(0x7f00000037c0)=""/179, 0x41100, 0x10, '\x00', r13, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=[r7, r14, r7], 0x0, 0x10, 0xff}, 0x94) ioctl$TUNATTACHFILTER(r12, 0x401054d5, &(0x7f0000003d40)={0x7, &(0x7f0000003d00)=[{0xb, 0xf8, 0x5, 0x3}, {0xfc01, 0x1, 0x7f, 0x8}, {0x6, 0x0, 0x3, 0xbc5d}, {0x8, 0x40, 0x64, 0x5}, {0x3, 0x5, 0x2, 0x4}, {0x4, 0xd, 0x6}, {0xffff, 0x99, 0x1, 0x6}]}) write$cgroup_pid(r12, &(0x7f0000003d80)=r5, 0x12) r15 = openat$tun(0xffffffffffffff9c, &(0x7f0000003dc0), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r15, 0x8924, &(0x7f0000003e00)={'netpci0\x00', @random="ffdc7c5008cd"}) r16 = getpid() bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000004e80)={0xffffffffffffffff, &(0x7f0000003e40)="ea681671e87bf338d8bd0db4864d68edb851b12992926b364085ed61aa279550af51d147ab29248454", &(0x7f0000003e80)=""/4096, 0x4}, 0x20) r17 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000004f00)=@generic={&(0x7f0000004ec0)='./file0\x00', 0x0, 0x10}, 0x18) getpid() ioctl$TUNSETIFF(r15, 0x400454ca, &(0x7f0000004f40)={'dummy0\x00', 0x100}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000051c0)={0x6, 0x20, &(0x7f0000004f80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffff8}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x4}, @generic={0x5, 0xb, 0x1, 0xa}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @exit, @jmp={0x5, 0x1, 0x0, 0xa, 0x4, 0x18, 0xfffffffffffffff0}, @ldst={0x2, 0x3, 0x2, 0x6, 0x5, 0x100, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000005080)='GPL\x00', 0x7fff, 0x0, 0x0, 0x40f00, 0x7, '\x00', r13, 0x25, r12, 0x8, &(0x7f00000050c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000005100)={0x1, 0x9, 0x0, 0x8001}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000005140)=[r17, r2, r12, r3, r3], &(0x7f0000005180)=[{0x3, 0x3, 0x3, 0x2}], 0x10, 0x7}, 0x94) perf_event_open(&(0x7f0000005280)={0x1, 0x80, 0x1, 0x2, 0x4, 0x40, 0x0, 0x3, 0x10048, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x1ff, 0x989, 0x2, 0x5f, 0x4, 0x401, 0x0, 0x8, 0x0, 0xfffffffffffffffb}, r16, 0xd, r11, 0x1) 3m35.884792339s ago: executing program 1 (id=17924): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000640)={&(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000000580)=[{&(0x7f00000000c0)="b55cec3739ea8c6c699809eb80c1810b146a06a25b01e1d6e3af2c3f4bd0546cd66a237c1d116354af4efc25ebb9074a261d09639470c6d1265d0b427de5b8f53c141ccc24f55026a4a281a71693253eaf6bbcbadd9b44492519d96c0c671c1263298e879c41cd1b05f8570aeac57746b6971c8bcb3a3ad76f59a2ca1561414cd4dac5d72b466de839d9f23d912adc1e5a4c7a7d9b29098d41fea79087cc2fd0fd36bb66a7b49470bc83091a7eb1fc6df47fae0dd027ab079e8481", 0xbb}, {&(0x7f0000000180)="efc86ce4065efb1da2bd4f051993ea2498e8b3ad3f132b3e693be32263e38a3ecced0a1b167544635775f301a17c59e14c9401dda4b493cf7d7247db6026ad504477270fc81f6be388a9d2eb9c4c630f7b703767bdf73209", 0x58}, {&(0x7f0000000200)="a82957512316b0686f28d1842f2ba280b40b9004b2a78040194c2be31bbfc9a9beefa6873ca09478fbb7c60cb9b3964fb525d3186b9632c6c5b634b6c8e72aa1f45877ae25058bc3d8a5946f3771c5950d35ddbfeae0438f153e046086561e23a64c98025ace2c31b3ee3cae01b51ac3f9e599404db1740065c2394b6af239a66c7a26f9711551538a42559c611ee6764000f433022d64554009e41876645914e79b62e780dedc55e1962085b5ccfe8901bcebd495f1f6dcef08cb3295cf9dcd8e9f843ad7d975fac121b65f675dc5cfc940a86dc11b0efc4d132c60a3f6f66ee7be6bb8d2f4f2e2322f93c725a82f8f43", 0xf1}, {&(0x7f0000000300)="2f40777b00b1a30a2fc2dae19303719d92894123ec2e2bd9df0edf1d8a79b035dd09456b008db60c8ee2be59445fa1cc0ead51b08f59d1106deddc88c0a12d25d0ddad11f8a6dcd9f43fadf16cdc6a24ef274b8fb3fdf01e433450c2abdfd83930301af6c97b0095500e5474c14d81ad1456b7aeb2925b15c3da066d20cb3852", 0x80}, {&(0x7f0000000380)="493b1783ac75d3db78cf3b637ff942ee891c31e72f9c9197db271390ba1eafc4bc104420f1e0ab440050ac0d5b5014908ee3c7a525e6916a516cf186285fc69474716d615bbf8c3b582cccd24c15e2c5d0a2c633129f7d0976c0cc30ae17f633c1743fbce069f59ec4765ac8759c911945b7b4bbe0f414b37a78023c1db440e971913f00ba722c47b4101bef4b6ff7ac5b815fadc0acec12e0fb26ed96357a3dee6200596a421af102816e04ee02cb14618175d21a6304d5c0fbc1b88319a3af2e5444eda18ddf35b8e8e74e7d694805bcd91711c0629e11988eb83f7a9f605eb34cab2ffae76c25f8ec0231fb50e099891e9aff", 0xf4}, {&(0x7f0000000480)="8e097f525133549496d0fadd7577d58d84c45cc65375f39e1df00101243c5f0b22909ea354ce152c09b34051e7af16c6338b339fc2b5c0aa729d61a5b45762a64051352d6cf73c93a3a6cce8282c7c04b5109e04f4e0f68bf84862ad1c6210da50343dc50d1ffe8ae32b93db129e04d92375f0e7c5a1c3684abd04cadb1eff4f6bdfc56a8ecba201e7594e9ccc31444d289a16daeabcfb9195ca08b2c5b68770b64970fcef853c66d49b634d9142904abaa17f7f60c56fab74ff10195fc1c708eabb432adcc50a10c76175aed576115a73bd7e67798b770b86e15ee80b124abd6e783ddb677ebde0c3056d7c2241833c7fa59c", 0xf3}], 0x6, &(0x7f0000000600)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80}}], 0x30}, 0x40040) (async) r3 = openat$cgroup(r0, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x6, 0x1c, &(0x7f00000006c0)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe30a}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @generic={0x31, 0x5, 0x4, 0x1, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}, @generic={0x1, 0x4, 0x7, 0x0, 0x7}], &(0x7f00000007c0)='syzkaller\x00', 0x491951ce, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000840)={0x6, 0xd, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000880)=[r3, 0x1, 0x1, 0xffffffffffffffff], &(0x7f00000008c0)=[{0x4, 0x1, 0xb, 0x7}], 0x10, 0xea8a}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r4, 0x0, 0xa5, 0x36, &(0x7f00000009c0)="38048fd59a6a176d7bc3996afe2cb407546c585c892ea99e3db78da68b47ac8367a354140768e02a5797095f74e29c0729d47f63bed61891fbf9f4c09a54efea3015e4c43b34ae9fd3798c46ce9c2e4c4b9da3dcd5348522b99d587cf2c2c3705a336aa15451442a20756427e8ea4c37618ec3258700b67c1d620a9485eaf8ca027283d85cb349213db778bf3e99807cf9d47bd968b454cc1d5f93f706a8236247904c2dca", &(0x7f0000000a80)=""/54, 0x10001, 0x0, 0xf0, 0xae, &(0x7f0000000ac0)="e0076072b219ebf818224592cba3d6417a3e7da41be262d318b35eebc6aa787fbf602b85cae6152aeef5dbe37c83b3643d4906a092f65cce19e8369cfa2c4f0637c040e000abfca9d014b50d35fb3c944ba17b6c7ce45f006506a4bfb00eac1c438a7133827629b7383212a7da9432c435305eca0650ea217a3732428b9e7e8748279ff57fecf0321e20b9d1111aab0dbf21187b937da6a37b46c829bc7350cbd75a0bee08229204858fd2ad5887529fec4db973b30f9e9ec69ae7e8fb8a0766bbee275184c16f0e87fd4393f4c4401d3c2eff3ee93bbce2d47d0d323cc67918f5b4da1185b13528c0294e9b15f17e02", &(0x7f0000000bc0)="394e0fe60209b3b366a7ed2ac335a44d8a455c246700bf2e98330316a379066262976ed6b53b68dfd2649282b6740a099e99dd952582b748ea87c9f4fb10c46864efd86b59edb6d8f126c5891b6674c06938f2281b68da62a44c27a40ca9a4a97eadf974b3109d75cb19d47493b8a121919d0bafeac43bf1657b343b787dc1a2939325f46849aab2a5d5026ba82f7276c3e4441f18b797b2fecc222acac8190dea3061b41a2ce82bd9489c558627", 0x4, 0x0, 0x3}, 0x50) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x18, 0x23, &(0x7f0000000d00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3be, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@ldst={0x2, 0x0, 0x0, 0x1, 0x1, 0x10}, @map_fd={0x18, 0xa}, @map_fd={0x18, 0x5, 0x1, 0x0, 0x1}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x70f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000e40)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x2, 0x6, 0xfff, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000f00)=[0x1, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x94) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001100)={@fallback=r4, 0x26, 0x0, 0x3, &(0x7f0000001000)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000001040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001080)=[0x0, 0x0, 0x0], &(0x7f00000010c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001140)={@fallback=r1, r5, 0x28, 0x2, r4, @void, @value=r0, @void, @void, r7}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000001180)={0x0, r6}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000012c0), 0x4) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001340)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000013c0)={0x13, 0x14, &(0x7f00000011c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0xe}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x4}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x2}]}, &(0x7f0000001280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback=0x15, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001300)={0x0, 0xe, 0x5, 0x7}, 0x10, r9, r6, 0x4, 0x0, &(0x7f0000001380)=[{0x3, 0x5, 0x9, 0x5}, {0x5, 0x4, 0x4, 0x3}, {0x0, 0x1, 0x10, 0x9}, {0x4, 0x2, 0x5, 0x4}], 0x10, 0x3}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001780)={&(0x7f0000001480)="cb3a2441bf3d35f2d48bcdf5cf2f255286d3434499221f11f2cd98e26fd8a76d1106ac69f208e2edf42217852416757db79c7a18b553edf6ed9da17f9a46f5292c91a93118d985c156a70ffee57ef3c368e6e0d76097bc9a3556c4a375c879b245ce66aeed5ec6f23bb1ef2156b72b3c00cc0c625dc57dba51165cf29f27691fed533cdb1e912040fa98b77151e61cff4c36ea1f8886a8c0", &(0x7f0000001540)=""/76, &(0x7f00000015c0)="a4ea28a249a5f8eed91cecc2f69c0f687ff4d0a82f88976ed43a35911f1892ec8798fc5b6ad74deddb24e2b46bf116b47f8650358ad4868fe94486cc76d8eacc6700b671a61a5a566bde9aa43178903419abd461cb4f861f8058f8084099acf63e17252dae939ab9617d0fb06c68a58d72c8a27771d95c4092321087876db4a404974453be4ced9252723afc0b2097c04bc46e3a700c9e25fb40fc844059f4c416a7fbbbe8cf4033b42c75f335af3a36231bb0cd64110e8f775bb8b65edc01100e370af290f4364d05da7e11cdb181819c63b9ee418bd1698a65af3b308f6cba2669874389c180e234", &(0x7f00000016c0)="0889025eee56627fdeb247cc5b8f8f288e6d99e5ba0ea5d72fc5f368a0b1e5b6023379fe6ba9d9ec618bb32e33bf1f2a5b2cb3c35c32989ec6e227e26ab797b0a582ab13c056c1ce629f5ef5f5e506fed5109f25eac89f3a77d3084605a4f3cef6a76ce0400e70b222277bcef34c7612256bcefc9e18e827e631697e42d87723667ff628ca37f5f3818ed8919191ba1fd1bf13a7ad072ad3db96b6dc447069b9f5136abddb855f92", 0xc, r6}, 0x38) (async) sendmsg(r2, &(0x7f0000001ac0)={&(0x7f00000017c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @remote}, 0x1, 0x4, 0x3}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001840)="54a6e238dd05015b3f156ed8221f3127a2cff8871be80cb0f68bcd8eb1369e2773ec8ca822f585ae8f5cb002d507aa5a78fbf3b1b0773f9b4fe979206f710e4bb1e3deff5dfea40023a7a59cbccdf3a245aa1432aea9feaa81307f35ef7ebd6f26f7bc2436fe8959ff59b0075a28403a469011cb68b0ba581a1655eae00e6cae34d34ef16fc018b07da03db8786a973cf96b7dc1c7925fcace7cb3b673452611e773932dfd3db4a761259f21cb3cdf91dfdfd2be91f705ad28f4367a9ac54d7a", 0xc0}, {&(0x7f0000001900)="5944fc6cb633d1d548a34433d12d7b090f093532c92ae5161870dddd7485cc55ee7066c7af6b64e17691d36df360d210bea7e8c99a24bc69c999f4b3378afed5ec5de8da73f6598ff45303c921b519bc8a3498eed19c72c99a4e1554e062d8f31438e94c1dbf8602284668957a2884fac4b215857ae5dc618b81e6d55bdbf998566b9eb8ca6cb974dfd0aaa19eb86c094887a087668106dc262c64d67da5a4986a952d88b0f14d8c0ec5180d2b090cb2caca0d2e4e4c67f961ec112a74b344", 0xbf}, {&(0x7f00000019c0)="5512450c484a14090b6a9861f83080890e86fbd8600af55028101ae70c2cd38395f5fe29c47299bc721b36b00d5e5bcc37b588afa82b4415993287fec01fe02e44192c28f6e882f0acebb84883abd8426ce29e1fb213adc0c7abb2c755454004fcb6c1a1bc76a7d38faf9c882c795c1843415d6548a951e04bc8815d1ead961d3ab66765c0bc8ae59bea8bdd386e708dc4958cc8e604cbe78b844eebacfdc50e69281a86", 0xa4}], 0x3}, 0x10) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000001b40)={0xfffffffe, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001b80)={r10}, 0x4) (async) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000001bc0)={r6}, 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002fc0)={0xffffffffffffffff, 0x20, &(0x7f0000002f80)={&(0x7f0000001ec0)=""/4096, 0x1000, 0x0, &(0x7f0000002ec0)=""/155, 0x9b}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000030c0)={0x8, 0x19, &(0x7f0000001c00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xfffffe01}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@ldst={0x2, 0x3, 0x1, 0x2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0xab, 0xc, 0x6, 0x2, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x7, 0x5, 0x2, 0x1, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0xa, 0x2, 0xa, 0x8, 0x10}, @map_idx_val={0x18, 0xebd9d52ffbc734bd, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1}, @map_fd={0x18, 0xb, 0x1, 0x0, r6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001d00)='syzkaller\x00', 0x6, 0xd6, &(0x7f0000001d40)=""/214, 0x41000, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000001e40)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000001e80)={0x0, 0x8, 0x2dc7, 0x1000}, 0x10, r12, 0xffffffffffffffff, 0x7, &(0x7f0000003000)=[r6], &(0x7f0000003040)=[{0x1, 0x3, 0xc, 0xb}, {0x3, 0x3, 0x9, 0x1}, {0x0, 0x2, 0x6, 0x9}, {0x1, 0x3, 0x9, 0x8}, {0x4, 0x2, 0x6}, {0x3, 0x2, 0x1, 0x6}, {0x3, 0x2, 0x7, 0x1}], 0x10, 0x401}, 0x94) (async) write$cgroup_int(r11, &(0x7f0000003180)=0x2, 0x12) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000034c0)={r4, 0xe0, &(0x7f00000033c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000003200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000003240)=[0x0, 0x0], &(0x7f0000003280)=[0x0], 0x0, 0xb3, &(0x7f00000032c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000003300), &(0x7f0000003340), 0x8, 0x5b, 0x8, 0x8, &(0x7f0000003380)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000031c0)={@ifindex=r13, r5, 0x2b, 0x200d, r6, @value=r6, @void, @void, @void, r7}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003500)) openat$cgroup_procs(r0, &(0x7f0000003540)='cgroup.threads\x00', 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000003800)={0x0, 0x4, &(0x7f0000003580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5844, 0x0, 0x0, 0x0, 0xf}, [@alu={0x7, 0x0, 0xd, 0xb, 0x2, 0x18, 0x10}]}, &(0x7f00000035c0)='GPL\x00', 0xf, 0x82, &(0x7f0000003600)=""/130, 0x41000, 0x1d, '\x00', r13, @fallback=0x1e, 0xffffffffffffffff, 0x8, &(0x7f00000036c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000003700)={0x5, 0x2, 0x2, 0x1}, 0x10, r14, 0xffffffffffffffff, 0x5, &(0x7f0000003740)=[r6, r6, r11], &(0x7f0000003780)=[{0x0, 0x4, 0xc, 0x9}, {0x0, 0x3, 0x10, 0x2}, {0x4, 0x5, 0x4, 0x9}, {0x1, 0x5, 0xc, 0xc}, {0x0, 0x5, 0x1, 0x2}], 0x10, 0x8}, 0x94) perf_event_open$cgroup(&(0x7f0000003900)={0x2, 0x80, 0x6, 0x80, 0x7, 0x0, 0x0, 0x1, 0x80040, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000038c0)}, 0x80, 0x80, 0x8ee1, 0x8, 0x200, 0x438, 0x0, 0x0, 0x200000, 0x0, 0xe}, r0, 0xb, 0xffffffffffffffff, 0x8) (async) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003c80)={0x6, 0x4, &(0x7f0000003ac0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x0, 0x1, 0x2, 0x7, 0x3, 0x30, 0xfffffffffffffffc}]}, &(0x7f0000003b00)='syzkaller\x00', 0x1, 0x15, &(0x7f0000003b40)=""/21, 0x41000, 0x2, '\x00', r13, 0x25, r8, 0x8, &(0x7f0000003b80)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000003bc0)=[r11, r11], &(0x7f0000003c00)=[{0x0, 0x4, 0x9, 0xc}, {0x5, 0x5, 0x9, 0x3}, {0x1, 0x3, 0x7, 0x4}, {0x1, 0x4, 0x6}, {0x3, 0x4, 0x3, 0x9}], 0x10, 0xcf}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000003e00)={0x18, 0x3, &(0x7f0000003980)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x67}], &(0x7f00000039c0)='syzkaller\x00', 0x0, 0x7e, &(0x7f0000003a00)=""/126, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x20, r4, 0x8, &(0x7f0000003a80)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, r9, r15, 0x3, &(0x7f0000003d80)=[r11, r6, 0xffffffffffffffff, r11, r6], &(0x7f0000003dc0)=[{0x3, 0x5, 0x10}, {0x1, 0x2, 0x10, 0xc}, {0x3, 0x2, 0x5, 0x4}], 0x10, 0x7}, 0x94) 3m35.883923509s ago: executing program 4 (id=17925): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x0, 0xc, &(0x7f0000001440)=ANY=[@ANYRES16=r0, @ANYRES64, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000009507698630ae164ed2bf2d05c886c447a870167b9faca1839af400113c28c7e82f6b7825071e2837"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffd0f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9fe4, 0x6}, 0x0, 0xc8, 0x0, 0x8, 0x0, 0xb, 0x1000, 0x0, 0x80, 0x0, 0x1ffffffffffffffc}, 0x0, 0x1, 0xffffffffffffffff, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r4) write$cgroup_type(r6, &(0x7f0000000280), 0x9) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="0b0000000700000001000100080000000100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000fb1a00000000cd0000000000000000000017dfb924dc89b17f7a632d51b9974f"], 0x48) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 3m35.753372931s ago: executing program 62 (id=17924): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000640)={&(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000000580)=[{&(0x7f00000000c0)="b55cec3739ea8c6c699809eb80c1810b146a06a25b01e1d6e3af2c3f4bd0546cd66a237c1d116354af4efc25ebb9074a261d09639470c6d1265d0b427de5b8f53c141ccc24f55026a4a281a71693253eaf6bbcbadd9b44492519d96c0c671c1263298e879c41cd1b05f8570aeac57746b6971c8bcb3a3ad76f59a2ca1561414cd4dac5d72b466de839d9f23d912adc1e5a4c7a7d9b29098d41fea79087cc2fd0fd36bb66a7b49470bc83091a7eb1fc6df47fae0dd027ab079e8481", 0xbb}, {&(0x7f0000000180)="efc86ce4065efb1da2bd4f051993ea2498e8b3ad3f132b3e693be32263e38a3ecced0a1b167544635775f301a17c59e14c9401dda4b493cf7d7247db6026ad504477270fc81f6be388a9d2eb9c4c630f7b703767bdf73209", 0x58}, {&(0x7f0000000200)="a82957512316b0686f28d1842f2ba280b40b9004b2a78040194c2be31bbfc9a9beefa6873ca09478fbb7c60cb9b3964fb525d3186b9632c6c5b634b6c8e72aa1f45877ae25058bc3d8a5946f3771c5950d35ddbfeae0438f153e046086561e23a64c98025ace2c31b3ee3cae01b51ac3f9e599404db1740065c2394b6af239a66c7a26f9711551538a42559c611ee6764000f433022d64554009e41876645914e79b62e780dedc55e1962085b5ccfe8901bcebd495f1f6dcef08cb3295cf9dcd8e9f843ad7d975fac121b65f675dc5cfc940a86dc11b0efc4d132c60a3f6f66ee7be6bb8d2f4f2e2322f93c725a82f8f43", 0xf1}, {&(0x7f0000000300)="2f40777b00b1a30a2fc2dae19303719d92894123ec2e2bd9df0edf1d8a79b035dd09456b008db60c8ee2be59445fa1cc0ead51b08f59d1106deddc88c0a12d25d0ddad11f8a6dcd9f43fadf16cdc6a24ef274b8fb3fdf01e433450c2abdfd83930301af6c97b0095500e5474c14d81ad1456b7aeb2925b15c3da066d20cb3852", 0x80}, {&(0x7f0000000380)="493b1783ac75d3db78cf3b637ff942ee891c31e72f9c9197db271390ba1eafc4bc104420f1e0ab440050ac0d5b5014908ee3c7a525e6916a516cf186285fc69474716d615bbf8c3b582cccd24c15e2c5d0a2c633129f7d0976c0cc30ae17f633c1743fbce069f59ec4765ac8759c911945b7b4bbe0f414b37a78023c1db440e971913f00ba722c47b4101bef4b6ff7ac5b815fadc0acec12e0fb26ed96357a3dee6200596a421af102816e04ee02cb14618175d21a6304d5c0fbc1b88319a3af2e5444eda18ddf35b8e8e74e7d694805bcd91711c0629e11988eb83f7a9f605eb34cab2ffae76c25f8ec0231fb50e099891e9aff", 0xf4}, {&(0x7f0000000480)="8e097f525133549496d0fadd7577d58d84c45cc65375f39e1df00101243c5f0b22909ea354ce152c09b34051e7af16c6338b339fc2b5c0aa729d61a5b45762a64051352d6cf73c93a3a6cce8282c7c04b5109e04f4e0f68bf84862ad1c6210da50343dc50d1ffe8ae32b93db129e04d92375f0e7c5a1c3684abd04cadb1eff4f6bdfc56a8ecba201e7594e9ccc31444d289a16daeabcfb9195ca08b2c5b68770b64970fcef853c66d49b634d9142904abaa17f7f60c56fab74ff10195fc1c708eabb432adcc50a10c76175aed576115a73bd7e67798b770b86e15ee80b124abd6e783ddb677ebde0c3056d7c2241833c7fa59c", 0xf3}], 0x6, &(0x7f0000000600)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80}}], 0x30}, 0x40040) (async) r3 = openat$cgroup(r0, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x6, 0x1c, &(0x7f00000006c0)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe30a}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @generic={0x31, 0x5, 0x4, 0x1, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}, @generic={0x1, 0x4, 0x7, 0x0, 0x7}], &(0x7f00000007c0)='syzkaller\x00', 0x491951ce, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000840)={0x6, 0xd, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000880)=[r3, 0x1, 0x1, 0xffffffffffffffff], &(0x7f00000008c0)=[{0x4, 0x1, 0xb, 0x7}], 0x10, 0xea8a}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r4, 0x0, 0xa5, 0x36, &(0x7f00000009c0)="38048fd59a6a176d7bc3996afe2cb407546c585c892ea99e3db78da68b47ac8367a354140768e02a5797095f74e29c0729d47f63bed61891fbf9f4c09a54efea3015e4c43b34ae9fd3798c46ce9c2e4c4b9da3dcd5348522b99d587cf2c2c3705a336aa15451442a20756427e8ea4c37618ec3258700b67c1d620a9485eaf8ca027283d85cb349213db778bf3e99807cf9d47bd968b454cc1d5f93f706a8236247904c2dca", &(0x7f0000000a80)=""/54, 0x10001, 0x0, 0xf0, 0xae, &(0x7f0000000ac0)="e0076072b219ebf818224592cba3d6417a3e7da41be262d318b35eebc6aa787fbf602b85cae6152aeef5dbe37c83b3643d4906a092f65cce19e8369cfa2c4f0637c040e000abfca9d014b50d35fb3c944ba17b6c7ce45f006506a4bfb00eac1c438a7133827629b7383212a7da9432c435305eca0650ea217a3732428b9e7e8748279ff57fecf0321e20b9d1111aab0dbf21187b937da6a37b46c829bc7350cbd75a0bee08229204858fd2ad5887529fec4db973b30f9e9ec69ae7e8fb8a0766bbee275184c16f0e87fd4393f4c4401d3c2eff3ee93bbce2d47d0d323cc67918f5b4da1185b13528c0294e9b15f17e02", &(0x7f0000000bc0)="394e0fe60209b3b366a7ed2ac335a44d8a455c246700bf2e98330316a379066262976ed6b53b68dfd2649282b6740a099e99dd952582b748ea87c9f4fb10c46864efd86b59edb6d8f126c5891b6674c06938f2281b68da62a44c27a40ca9a4a97eadf974b3109d75cb19d47493b8a121919d0bafeac43bf1657b343b787dc1a2939325f46849aab2a5d5026ba82f7276c3e4441f18b797b2fecc222acac8190dea3061b41a2ce82bd9489c558627", 0x4, 0x0, 0x3}, 0x50) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x18, 0x23, &(0x7f0000000d00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3be, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@ldst={0x2, 0x0, 0x0, 0x1, 0x1, 0x10}, @map_fd={0x18, 0xa}, @map_fd={0x18, 0x5, 0x1, 0x0, 0x1}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x70f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000e40)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x2, 0x6, 0xfff, 0xfff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000f00)=[0x1, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x94) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001100)={@fallback=r4, 0x26, 0x0, 0x3, &(0x7f0000001000)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000001040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001080)=[0x0, 0x0, 0x0], &(0x7f00000010c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001140)={@fallback=r1, r5, 0x28, 0x2, r4, @void, @value=r0, @void, @void, r7}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000001180)={0x0, r6}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000012c0), 0x4) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001340)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000013c0)={0x13, 0x14, &(0x7f00000011c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0xe}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x4}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x2}]}, &(0x7f0000001280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback=0x15, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001300)={0x0, 0xe, 0x5, 0x7}, 0x10, r9, r6, 0x4, 0x0, &(0x7f0000001380)=[{0x3, 0x5, 0x9, 0x5}, {0x5, 0x4, 0x4, 0x3}, {0x0, 0x1, 0x10, 0x9}, {0x4, 0x2, 0x5, 0x4}], 0x10, 0x3}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001780)={&(0x7f0000001480)="cb3a2441bf3d35f2d48bcdf5cf2f255286d3434499221f11f2cd98e26fd8a76d1106ac69f208e2edf42217852416757db79c7a18b553edf6ed9da17f9a46f5292c91a93118d985c156a70ffee57ef3c368e6e0d76097bc9a3556c4a375c879b245ce66aeed5ec6f23bb1ef2156b72b3c00cc0c625dc57dba51165cf29f27691fed533cdb1e912040fa98b77151e61cff4c36ea1f8886a8c0", &(0x7f0000001540)=""/76, &(0x7f00000015c0)="a4ea28a249a5f8eed91cecc2f69c0f687ff4d0a82f88976ed43a35911f1892ec8798fc5b6ad74deddb24e2b46bf116b47f8650358ad4868fe94486cc76d8eacc6700b671a61a5a566bde9aa43178903419abd461cb4f861f8058f8084099acf63e17252dae939ab9617d0fb06c68a58d72c8a27771d95c4092321087876db4a404974453be4ced9252723afc0b2097c04bc46e3a700c9e25fb40fc844059f4c416a7fbbbe8cf4033b42c75f335af3a36231bb0cd64110e8f775bb8b65edc01100e370af290f4364d05da7e11cdb181819c63b9ee418bd1698a65af3b308f6cba2669874389c180e234", &(0x7f00000016c0)="0889025eee56627fdeb247cc5b8f8f288e6d99e5ba0ea5d72fc5f368a0b1e5b6023379fe6ba9d9ec618bb32e33bf1f2a5b2cb3c35c32989ec6e227e26ab797b0a582ab13c056c1ce629f5ef5f5e506fed5109f25eac89f3a77d3084605a4f3cef6a76ce0400e70b222277bcef34c7612256bcefc9e18e827e631697e42d87723667ff628ca37f5f3818ed8919191ba1fd1bf13a7ad072ad3db96b6dc447069b9f5136abddb855f92", 0xc, r6}, 0x38) (async) sendmsg(r2, &(0x7f0000001ac0)={&(0x7f00000017c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @remote}, 0x1, 0x4, 0x3}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001840)="54a6e238dd05015b3f156ed8221f3127a2cff8871be80cb0f68bcd8eb1369e2773ec8ca822f585ae8f5cb002d507aa5a78fbf3b1b0773f9b4fe979206f710e4bb1e3deff5dfea40023a7a59cbccdf3a245aa1432aea9feaa81307f35ef7ebd6f26f7bc2436fe8959ff59b0075a28403a469011cb68b0ba581a1655eae00e6cae34d34ef16fc018b07da03db8786a973cf96b7dc1c7925fcace7cb3b673452611e773932dfd3db4a761259f21cb3cdf91dfdfd2be91f705ad28f4367a9ac54d7a", 0xc0}, {&(0x7f0000001900)="5944fc6cb633d1d548a34433d12d7b090f093532c92ae5161870dddd7485cc55ee7066c7af6b64e17691d36df360d210bea7e8c99a24bc69c999f4b3378afed5ec5de8da73f6598ff45303c921b519bc8a3498eed19c72c99a4e1554e062d8f31438e94c1dbf8602284668957a2884fac4b215857ae5dc618b81e6d55bdbf998566b9eb8ca6cb974dfd0aaa19eb86c094887a087668106dc262c64d67da5a4986a952d88b0f14d8c0ec5180d2b090cb2caca0d2e4e4c67f961ec112a74b344", 0xbf}, {&(0x7f00000019c0)="5512450c484a14090b6a9861f83080890e86fbd8600af55028101ae70c2cd38395f5fe29c47299bc721b36b00d5e5bcc37b588afa82b4415993287fec01fe02e44192c28f6e882f0acebb84883abd8426ce29e1fb213adc0c7abb2c755454004fcb6c1a1bc76a7d38faf9c882c795c1843415d6548a951e04bc8815d1ead961d3ab66765c0bc8ae59bea8bdd386e708dc4958cc8e604cbe78b844eebacfdc50e69281a86", 0xa4}], 0x3}, 0x10) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b00)) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000001b40)={0xfffffffe, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001b80)={r10}, 0x4) (async) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000001bc0)={r6}, 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002fc0)={0xffffffffffffffff, 0x20, &(0x7f0000002f80)={&(0x7f0000001ec0)=""/4096, 0x1000, 0x0, &(0x7f0000002ec0)=""/155, 0x9b}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000030c0)={0x8, 0x19, &(0x7f0000001c00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xfffffe01}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@ldst={0x2, 0x3, 0x1, 0x2, 0x5, 0xffffffffffffffff, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0xab, 0xc, 0x6, 0x2, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x7, 0x5, 0x2, 0x1, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0xa, 0x2, 0xa, 0x8, 0x10}, @map_idx_val={0x18, 0xebd9d52ffbc734bd, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1}, @map_fd={0x18, 0xb, 0x1, 0x0, r6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001d00)='syzkaller\x00', 0x6, 0xd6, &(0x7f0000001d40)=""/214, 0x41000, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000001e40)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000001e80)={0x0, 0x8, 0x2dc7, 0x1000}, 0x10, r12, 0xffffffffffffffff, 0x7, &(0x7f0000003000)=[r6], &(0x7f0000003040)=[{0x1, 0x3, 0xc, 0xb}, {0x3, 0x3, 0x9, 0x1}, {0x0, 0x2, 0x6, 0x9}, {0x1, 0x3, 0x9, 0x8}, {0x4, 0x2, 0x6}, {0x3, 0x2, 0x1, 0x6}, {0x3, 0x2, 0x7, 0x1}], 0x10, 0x401}, 0x94) (async) write$cgroup_int(r11, &(0x7f0000003180)=0x2, 0x12) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000034c0)={r4, 0xe0, &(0x7f00000033c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000003200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000003240)=[0x0, 0x0], &(0x7f0000003280)=[0x0], 0x0, 0xb3, &(0x7f00000032c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000003300), &(0x7f0000003340), 0x8, 0x5b, 0x8, 0x8, &(0x7f0000003380)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000031c0)={@ifindex=r13, r5, 0x2b, 0x200d, r6, @value=r6, @void, @void, @void, r7}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003500)) openat$cgroup_procs(r0, &(0x7f0000003540)='cgroup.threads\x00', 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000003800)={0x0, 0x4, &(0x7f0000003580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5844, 0x0, 0x0, 0x0, 0xf}, [@alu={0x7, 0x0, 0xd, 0xb, 0x2, 0x18, 0x10}]}, &(0x7f00000035c0)='GPL\x00', 0xf, 0x82, &(0x7f0000003600)=""/130, 0x41000, 0x1d, '\x00', r13, @fallback=0x1e, 0xffffffffffffffff, 0x8, &(0x7f00000036c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000003700)={0x5, 0x2, 0x2, 0x1}, 0x10, r14, 0xffffffffffffffff, 0x5, &(0x7f0000003740)=[r6, r6, r11], &(0x7f0000003780)=[{0x0, 0x4, 0xc, 0x9}, {0x0, 0x3, 0x10, 0x2}, {0x4, 0x5, 0x4, 0x9}, {0x1, 0x5, 0xc, 0xc}, {0x0, 0x5, 0x1, 0x2}], 0x10, 0x8}, 0x94) perf_event_open$cgroup(&(0x7f0000003900)={0x2, 0x80, 0x6, 0x80, 0x7, 0x0, 0x0, 0x1, 0x80040, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000038c0)}, 0x80, 0x80, 0x8ee1, 0x8, 0x200, 0x438, 0x0, 0x0, 0x200000, 0x0, 0xe}, r0, 0xb, 0xffffffffffffffff, 0x8) (async) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003c80)={0x6, 0x4, &(0x7f0000003ac0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x0, 0x1, 0x2, 0x7, 0x3, 0x30, 0xfffffffffffffffc}]}, &(0x7f0000003b00)='syzkaller\x00', 0x1, 0x15, &(0x7f0000003b40)=""/21, 0x41000, 0x2, '\x00', r13, 0x25, r8, 0x8, &(0x7f0000003b80)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000003bc0)=[r11, r11], &(0x7f0000003c00)=[{0x0, 0x4, 0x9, 0xc}, {0x5, 0x5, 0x9, 0x3}, {0x1, 0x3, 0x7, 0x4}, {0x1, 0x4, 0x6}, {0x3, 0x4, 0x3, 0x9}], 0x10, 0xcf}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000003e00)={0x18, 0x3, &(0x7f0000003980)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x67}], &(0x7f00000039c0)='syzkaller\x00', 0x0, 0x7e, &(0x7f0000003a00)=""/126, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x20, r4, 0x8, &(0x7f0000003a80)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, r9, r15, 0x3, &(0x7f0000003d80)=[r11, r6, 0xffffffffffffffff, r11, r6], &(0x7f0000003dc0)=[{0x3, 0x5, 0x10}, {0x1, 0x2, 0x10, 0xc}, {0x3, 0x2, 0x5, 0x4}], 0x10, 0x7}, 0x94) 3m35.742111942s ago: executing program 63 (id=17925): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x0, 0xc, &(0x7f0000001440)=ANY=[@ANYRES16=r0, @ANYRES64, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000009507698630ae164ed2bf2d05c886c447a870167b9faca1839af400113c28c7e82f6b7825071e2837"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffd0f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9fe4, 0x6}, 0x0, 0xc8, 0x0, 0x8, 0x0, 0xb, 0x1000, 0x0, 0x80, 0x0, 0x1ffffffffffffffc}, 0x0, 0x1, 0xffffffffffffffff, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r4) write$cgroup_type(r6, &(0x7f0000000280), 0x9) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="0b0000000700000001000100080000000100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000fb1a00000000cd0000000000000000000017dfb924dc89b17f7a632d51b9974f"], 0x48) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 10.253405233s ago: executing program 6 (id=20962): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 8.444659528s ago: executing program 6 (id=20962): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 6.579666784s ago: executing program 0 (id=21118): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r1 = gettid() r2 = perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0xf4, 0xac, 0xd, 0x8, 0x0, 0xff, 0x28689, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8f75, 0x0, @perf_config_ext={0x9, 0x8}, 0x10, 0x12, 0x2008, 0x4, 0x9, 0x664, 0x200, 0x0, 0x6, 0x0, 0x9}, 0xffffffffffffffff, 0x8, r0, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r1, r2, 0x0, 0x1, &(0x7f0000000200)='\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x23, 0x5, 0x1000, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f00000002c0), 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000d313f800000000", @ANYRES32, @ANYBLOB, @ANYBLOB], 0x48) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='memory.swap.max\x00', 0x2, 0x0) socketpair(0x10, 0x3, 0x6, &(0x7f0000000280)) recvmsg(0xffffffffffffffff, 0x0, 0x1f00) syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)) 6.561482614s ago: executing program 6 (id=20962): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 4.67467458s ago: executing program 0 (id=21121): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="05000000050000000800000008000000000000005043daefcee1593a33835b60437bc9d3465e87011abfff0a056112b2ad8f68998dd6caf360978353c3e332b7e138951a4dccbb11fb5c90f02156a7387726d55488a557b0292579c6fcc30319615c8dfb719bc02e6d4af87c875b46", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000500"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8924, 0x0) ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000040000850000001b000000b700000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) syz_clone(0x10090100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000300)=@base={0x8, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x6, 0x6, 0xffff0b6f, 0x2004, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x5, 0x2}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r2, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0x20, &(0x7f0000000ac0)={&(0x7f00000008c0)=""/195, 0xc3, 0x0, &(0x7f00000009c0)=""/253, 0xfd}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000b40)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000b80)={r0, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x18, 0x2f, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1857, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff9}}, @jmp={0x5, 0x1, 0xa, 0x2, 0x3, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x40f00, 0x40, '\x00', r7, @fallback=0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x2, 0x2, 0x5, 0x2}, 0x10, r8, r1, 0x0, &(0x7f0000000bc0)=[r9, r0, r0, r10], 0x0, 0x10, 0x3e0a}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='sched_switch\x00', r11}, 0x18) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r12, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x25, 0x0, 0x3, 0xfffffffe}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4.673577911s ago: executing program 2 (id=21123): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="0200000004000000060000000500"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000032e1ec77c66e7331f300000000000000250000000000", @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x26}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x2, &(0x7f0000000540)=@raw=[@btf_id={0x18, 0xa, 0x3, 0x0, 0x3}], &(0x7f0000000580)='syzkaller\x00', 0x5c1c0cef, 0xdd, &(0x7f00000008c0)=""/221, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0x8, 0x2, 0xf}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[r0, r0], &(0x7f0000000780)=[{0x5, 0x5, 0x4, 0x3}, {0x4, 0x2, 0xf, 0x8}, {0x0, 0x5, 0x1, 0x3}], 0x10, 0xe6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000100000005000000", @ANYRES32, @ANYBLOB="8b5b371c895134c3de3000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x0, 0x1}, 0x18208, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x2}, 0x842a, 0x200000000000000, 0x7, 0x5, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r7, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x80, 0x0, r6, 0x4, '\x00', r9, r10, 0x0, 0x1, 0xffffffff}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) 4.616718872s ago: executing program 3 (id=21125): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xf5}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xf5}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) (async) 4.615488951s ago: executing program 2 (id=21127): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) (async, rerun: 32) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x103000, 0x0) (async, rerun: 32) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000004c0)='thermal_power_cpu_get_power\x00', r6, 0x0, 0x5}, 0x18) (async) close(r5) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNGETVNETLE(r5, 0x40047451, &(0x7f0000000140)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r2, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000880)=r4}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_ext={0x1c, 0xa, &(0x7f0000000c00)=ANY=[@ANYBLOB="39400200000000008520000005000000182b0000", @ANYRES32=r1, @ANYBLOB="00000000011fe30000000000594b26d0fba8660000225c48faf58c12d21c8cb6cd279ec72e933dc4a5fe21bfba4216d678dd9871f989db943b2dd47dd120551f10bfb200ddefb8cbb6add3d4039f7c40ba6237ba5c00"/103, @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x67b0517b, 0xe5, &(0x7f0000000780)=""/229, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x7, 0x10000, 0x5}, 0x10, 0x62db, r1, 0x8, &(0x7f0000000900)=[r8, r2], &(0x7f0000000940)=[{0x2, 0x2, 0x0, 0xa}, {0x4, 0x5, 0xe, 0x5}, {0x2, 0x3, 0x0, 0x2}, {0x0, 0x4, 0x4, 0x6}, {0x3, 0x5, 0x10, 0x3}, {0x2, 0x5, 0x1, 0x8}, {0x2, 0x1, 0x3, 0x7}, {0x3, 0x1, 0x5, 0x9}], 0x10, 0xa}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) (async, rerun: 64) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) (async, rerun: 32) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a2, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="002d92cf9d740dfd3000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 4.533875773s ago: executing program 2 (id=21129): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='kmem_cache_free\x00', r1}, 0x10) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="d40200002000000018000000000000000000000000000000950000000000000038720a013653e84c584fdd38a1990000df9e190a587bed507002e83640d72226cbc0c89b926a26bce7509cb01faa84adcab3c3ca7654ee7c8532e9d31c4ee9f50b45c70263941287a6587f0574ece141dfa43e89cf14b4c24709cd16549d1a77630ee22b64da2c75c3eadf2f267fc9591999205f1d4848fe0c08b094b405e6fa589610085e19fe374560d6b6a92472049a9c91e9d2ee25b9cd3a6cf25196158238d177ada41056f16c99691e1089a9fb3c31ae2c5c9486ff0853b08119e935f5679e87301ac3819364c9ebcfb509d63c95832248f4b11982dbed0f6c133827"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xdd, &(0x7f0000000000)=""/156}, 0x80) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xdd, &(0x7f0000000000)=""/156}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r4, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880), 0x8, 0x29, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r4, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880), 0x8, 0x29, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x15, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x8, 0x18, &(0x7f00000005c0)=""/24, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x0, 0x5, 0x8ee, 0x4}, 0x10, r6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000), &(0x7f0000000500)=""/64}, 0x20) sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRESOCT=r2, @ANYRES64=r0, @ANYRES32=r2, @ANYRES32=r7], 0x18, 0x854}, 0x8810) openat$cgroup_devices(r5, &(0x7f0000000240)='devices.deny\x00', 0x2, 0x0) (async) openat$cgroup_devices(r5, &(0x7f0000000240)='devices.deny\x00', 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r3) close(r9) 4.532143173s ago: executing program 3 (id=21130): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) gettid() ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x4004743d, 0x110e22fff6) write$cgroup_type(r1, 0x0, 0x0) 4.466742404s ago: executing program 5 (id=21132): bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004", @ANYRESDEC=r0, @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.407521896s ago: executing program 0 (id=21133): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0xc8b3986273044b3a, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x30120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0/file0\x00', 0x42) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) (async) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791218000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) (async) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/63}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/63}, 0x20) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000300), 0x75, r6}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000300), 0x75, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 4.406226635s ago: executing program 2 (id=21134): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000200)=ANY=[@ANYRESHEX=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8034000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, &(0x7f0000000080), &(0x7f00000000c0)=""/102}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1e, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000800000000000000000000df84000000a50000009500000000000000ff1b1e45ab66db88a13433d889d3f33b086f0473d8c6717ebbac1f61956a79646aed18a312146b171167f02b23155dd24f9191ce433005a190bdc08135738b2d074bdd2b33c06f80e5065642a3d2e95ce5cf8ac3817319e5a53b06d293"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x88) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r1, &(0x7f0000000500)="4651ae1f8ae0c26e46c982976cab890892fa8e4a0c6975099d406541c9c1b6"}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xef, 0x3, 0x0, 0x0, 0x0, 0x0, 0x28264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x2, @perf_config_ext={0x1eb, 0x10001}, 0x2018, 0x0, 0x0, 0x2, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x9}, 0x8) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x4000}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b400000000090000dd0a00000000000073019d00000000009500000000000000425e494e53a90f38f870e056d03b2010633dee8a3a6601dbd212"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 4.405938066s ago: executing program 3 (id=21135): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) unlink(&(0x7f0000000140)='./cgroup\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000080000000000000000000080850000000f00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000725e850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x1000000000000000}, 0x440, 0x0, 0xfffffff9, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x98}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) (async) close(0x3) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) (async) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000680)={r1}, 0xc) (async) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000080)={&(0x7f0000000180)="62f11fa048f987ddb3d80aca28644add9bc2dbad26a14bd68a048f48f6a4c45973c7d99007ff6155e93858c36a76ad43d415f87aca95a2ad644caca59e0512616d3538359517a02d14e0dd0b83a7ea05655257e1961d746dd26fdc61d030495d53f3d1835c6418213b487ef061b08d972558ba9c36856f0a6ad3c8c647542b36a81a2ed9ff4f0c1e5776c56aa9c0e4bc38b5007874fb119990e5874ae5b457cef4ebbe5a8d60365b11a8c04c23d4f3", &(0x7f0000000000)=""/33, &(0x7f0000000300)="1c24d370a99ab5960559555850bd2d25228a904f47523a510ff2ce3990a5f601ba27163904904a7888355ee9c35b0a8363182865e83b76b2db8427dfd57c053aef02e902802f8221902d331038a12d820054ea18e860bf54947697f0bc078db2abcc071baf5e1bfcb025cdda83af5ef7222715c9c5d185fc67cfee21ddcb53f7250178d3baf5876b6dfedfc0812f0b10d41075651e5fdf329345", &(0x7f00000003c0)="e736a8730d45998c9f55870530f1b54a13b3ba2a0c83a8dd852bf5806eeb6bfdf74d24f9bca70ca121eb96f19bac0fa3488c5d186db6a69522902b0aa5e25e40fd132f627bbc225265f65b7368f4bafe825c558f789442e3f6bd8c9e260b4dfc54928e8d3e47830bb190c2d2e7b5664c9aa26874c728c1f5986a5ec4d3341078be4c208540209e", 0x5, r0, 0x4}, 0x38) 4.405416465s ago: executing program 6 (id=20962): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 2.457153183s ago: executing program 0 (id=21136): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="660a0000000000001b04fb33e62bc59c9ce5c635c9e42361114c0000000000850000004400000095000000631b0000"], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1}, 0x18) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003440)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0xbd, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x2, 0x8, 0x0, 0x80, r2, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0xffffffff, 0xa}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xdba24f1ae7f3ded2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x10, 0x8000020}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a3, &(0x7f0000000080)) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 2.455250353s ago: executing program 5 (id=21137): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xb9, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x9b}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f00000003c0)=@framed={{}, [@printk]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000400), &(0x7f0000000340)=""/173}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000040)}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@cgroup=r0, 0x10, 0x0, 0x0, &(0x7f0000000180)=[0x0], 0x1, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0]}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="18060000000000010000000000000000851000000200000020000000000000009500007b0000000085000000560000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x2, 0x92, &(0x7f0000000240)=""/146}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1ff, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 2.453957363s ago: executing program 2 (id=21138): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/61}, 0x33) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000180)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0], 0x0, 0x88, &(0x7f00000005c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000640), &(0x7f0000000700), 0x8, 0x2e, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8}]}, @decl_tag={0x3, 0x0, 0x0, 0x11, 0x1, 0x9}, @enum64={0xe, 0x4, 0x0, 0x13, 0x1, 0x8, [{0x2, 0xc, 0x2fd5}, {0x10, 0x1, 0x1000}, {0xf, 0x400, 0x1}, {0x1, 0x4, 0x6}]}, @float={0xa, 0x0, 0x0, 0x10, 0xc}, @volatile={0x7, 0x0, 0x0, 0x9, 0x4}, @const={0x7, 0x0, 0x0, 0xa, 0x1}, @struct={0x4, 0x3, 0x0, 0x4, 0x1, 0x2b7, [{0x1, 0x5, 0x7fff}, {0x2, 0x3, 0x7}, {0x0, 0x1, 0x9}]}, @type_tag={0x5, 0x0, 0x0, 0x12, 0x5}, @var={0xb, 0x0, 0x0, 0xe, 0x2, 0x2}]}, {0x0, [0x61, 0x2e, 0x30, 0x30]}}, &(0x7f0000000c40)=""/237, 0xee, 0xed, 0x1, 0x1, 0x10000}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000d40)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x9e0, '\x00', r3, r4, 0x0, 0x1, 0x1}, 0x50) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x3a0ffffffff) bpf$MAP_CREATE(0x3ba, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x5, 0x4, 0x8, 0x5, 0x3a410, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc, 0x0, @value=r5, @void, @value=r5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x2000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000940)=@bloom_filter={0x1e, 0x7fffffff, 0x3, 0xef2, 0x2, 0xffffffffffffffff, 0x2, '\x00', r3, r5, 0x0, 0x4, 0x2, 0xe}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000dc0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r9, @ANYBLOB="00000000000000007900000000000000180000000000000000000000000000009500000000000000d50a0000000000009500000000000000cfb0c225d007de9023803a9bf33467fa286a8bc593235fd7e006032e5aba617f525e51c6f03bf61a15794b5aaa", @ANYRES32=r0], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x41100}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x2, 0x5, 0x84, &(0x7f0000000040)) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 2.452214683s ago: executing program 3 (id=21139): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1, 0x0, 0xf}, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) (async) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='mm_page_alloc\x00', r7}, 0x10) (async) ioctl$TUNGETVNETLE(r5, 0x40047451, &(0x7f0000000180)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYRES64=r1, @ANYRESOCT=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000700)='signal_generate\x00'}, 0x18) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000040000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000700)='signal_generate\x00', r9}, 0x18) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b00000005000000000000000900000000000000", @ANYRES32, @ANYBLOB="00000000960000000000000000f9ffffff000000f87d2eb41476e73ee7f24995fc4d005ee87cb3a30ff8314938d3a7f19af98e44c72ae957f5ef54a977d5ea46fab6590356e74736dd03cd0e492605b0", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r13 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000008000000000000000000000181100", @ANYRES32=r12, @ANYRES64=r10, @ANYRES64=r13, @ANYRESOCT=0x0, @ANYRES32=r4, @ANYRESHEX=r8, @ANYRES64=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="03000000000000000e00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 2.381850764s ago: executing program 5 (id=21140): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x61680, 0x20, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1}, 0x0, &(0x7f0000000100)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0xa, 0x3, 0x4, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="04000000000000000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB], 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x8}, 0x8) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000540)={0x2, 0x80, 0x56, 0x8e, 0x7, 0x2, 0x0, 0x5, 0x4b620, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000280)}, 0x20, 0x5, 0x2, 0x8, 0x100000000, 0x9, 0x2000, 0x0, 0x1, 0x0, 0x3}) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_pressure(r6, 0x0, 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)=@generic={&(0x7f00000001c0)='./file0\x00', r1}, 0x18) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 2.325996436s ago: executing program 3 (id=21141): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_drop_inode\x00', r0, 0x0, 0x6b7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="180900001200000000000000fe000000850000006d"], &(0x7f0000000980)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x65) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000000c0)=0x100000000, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@cgroup=r5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000007000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b00000005000000020000000200000005000000", @ANYRES32, @ANYBLOB="00000000000000000000433cb9c649861e0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x41, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000eaffffffbfffffff0000000000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f00000005c0)=ANY=[@ANYRESDEC, @ANYRES32=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r11}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x480280, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='net_dev_xmit\x00', r12}, 0x18) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r13, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r14}, 0x10) 2.273738416s ago: executing program 6 (id=20962): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 128.155478ms ago: executing program 0 (id=21142): bpf$TOKEN_CREATE(0x24, &(0x7f0000000100), 0x8) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x0, 0x18e, &(0x7f0000000c40)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=d\'%\x11c\x91l,\x10\xb2\x1d\xc4?t\x904h\xb6\x80\r\xa8\x96\xd6Dq_\xdf(j\xa5\xa7\xd3*\x84\x85\xdb\x80\xcd8\xd3|\x8b\x84\x9a\'*g\xc2S\xdc\"*\xa22\x14\xf6\xa0<\x90n\xda^\x8a)\xce\xf3\xcd\xa32\xab3X\xa92t\xba\xbet\xd3r\x9b?B\x9ee\xe8)\x7f#\xa0\x8a\x94NW\x12\xe1\x93z\xb3\xf04\x00N\xebE\xf84\x8cz\x1e\xfa\x03G\xd9\x11\xb3\xd7\xaa\xba8\xbdx\xce\xb8\xb64\x1c\xa8\xc1\xf7\xad\x9d\'\xe0\xad*\x19\xae\xb1\xc5\xa6\xd9\xbb\x82[\xa3\x1f\xdc\xeb\xa6k\x8f\x91\x18\x97mPs\x9c\x18\v\xdd\x7f[M!\xb8\xf1\xc5\xc6\xd8\xd4&\x9c2sM6\x82\x0e\x92d\xec\tRH\x16bL\x17\xa2\xd6\xd6\a\x01\xc2T~6\x95\f\t\xd5l<\xb3\xc1\r\xcdbW\xdf\x10\'\xae\x00\xc6:\x1a\xaf\xe1\xd9:\xaa\r\x84\xc4\xd2k\xb5r\xfaQz\xc7\x8bz\xdb<#\xb4\x8a-\xc2\x99\xae\x00\xb9\xfc\x0e%[\xd4\xd5g\xe5\xb41\x19_\xaeWJ \f\xbe\xe2[\xe5b\x1eE\xb4\x93\x00|\x01\xc8\x9a\f\x12\xd8\x81\xb7\x8e\x83?\x97\x84\x8e\xe5!\xbbQ\xfc(\xcdPAa\xa2N@X\xc8\xb0\xfb*Gv\xb1\xd0\x89\xc2\x87\xd5[\xf7r\x0fA\x8b\x9a\x8c\x1a\xacv\xba\x95O,\x87\t\xd1\x84\xdb\xa1\xeb\xb0z<\x87_(\x0e\xb2\xedqJ\xa9(\xddm9'}, 0x30) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x2, 0x5, 0x7, 0x4f, 0x0, 0x8a2f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000440), 0x4}, 0x8, 0xfffffffffffffff7, 0x4, 0x7, 0x5, 0x2, 0x6, 0x0, 0x8, 0x0, 0x2a}, r1, 0xe, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x4, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair(0xa, 0x80000, 0x20000003, &(0x7f0000000000)) socketpair(0x1a, 0x4, 0x5, &(0x7f00000000c0)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x4, 0x0, 0xf3, 0x6, 0x0, 0x0, 0xd006e1258c48358c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7fff}, 0xc20, 0xc8, 0x7, 0x5, 0x0, 0x0, 0x3ff, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0xc) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000000000000f37538e486dd630080fc5c082c00db5bffffffffff000000060300000023000000000000000000000000ac1414aa2c"], 0xfdef) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x9) close(r2) 127.488928ms ago: executing program 5 (id=21143): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfdef) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) (async, rerun: 32) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x1, {0x4e20, 0xf5}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) (async, rerun: 32) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) (async) r7 = gettid() syz_open_procfs$namespace(r7, &(0x7f0000000000)='ns/ipc\x00') (async, rerun: 64) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='kfree\x00', r8}, 0x18) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000003000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56}, 0x28) (rerun: 64) write$cgroup_subtree(r6, 0x0, 0xfdef) 125.980068ms ago: executing program 2 (id=21144): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000611464000000000005000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x3b, 0x10, 0x0, 0x1800}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c23003f) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000004000001d8500000007000000440000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x86}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) close(0x4) 125.548398ms ago: executing program 3 (id=21145): bpf$MAP_CREATE(0x0, &(0x7f0000001100)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0x1, 0x2}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x2, 0x4, 0x10008, 0x1, 0x1000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xa, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000400000000400f7ffffff0000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @cgroup_sock_addr=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f00000010c0)={0x0, 0x0, 0x0}, 0x0) close(r2) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="00000000006e4ce1230a00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) close(0xffffffffffffffff) mkdir(&(0x7f00000001c0)='./file0\x00', 0x45) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000540)='./file0\x00', r4}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 71.500549ms ago: executing program 0 (id=21146): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb227733218120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={r0, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8f, &(0x7f0000000900)=[{}], 0x8, 0x10, &(0x7f0000000940), &(0x7f0000000980), 0x8, 0x7a, 0x8, 0x8, &(0x7f00000009c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000080000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000b40)={0x3, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x1, @perf_config_ext={0x4, 0x1}, 0x18208, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfff0000000000005, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xf, 0x3}, 0x842a, 0x200000000000000, 0x7, 0x5, 0x0, 0x1ffffd, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x3) close(0x4) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000500000000000000", @ANYRES32=r1, @ANYBLOB="1000"/20, @ANYRES32=r2, @ANYRES32, @ANYBLOB="00000000040000000000000000000000000000000083c3a000000000000042"], 0x50) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000e40)=r3, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000f40)=@bpf_tracing={0x1a, 0x2a, &(0x7f0000000c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@jmp={0x5, 0x1, 0x3, 0x6, 0x1, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xd}, @alu={0x4, 0x1, 0x3, 0x5, 0x8, 0x4, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x2, 0x3, 0x2, 0x0, 0x565d}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x18f}}}, &(0x7f0000000dc0)='GPL\x00', 0x80000000, 0x14, &(0x7f0000000e00)=""/20, 0x41100, 0x0, '\x00', r2, 0x19, r6, 0x8, &(0x7f0000000e80)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000ec0)={0x2, 0xd, 0x40, 0x6}, 0x10, 0x2524b, r0, 0x2, 0x0, &(0x7f0000000f00)=[{0x5, 0x2, 0x10, 0x7}, {0x3, 0x2, 0x3, 0x6}], 0x10, 0x1}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b0000000000bc87000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES64=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000f82818110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0b000000c3b84aa031679a0d0900e53112a5c3f7", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='mm_page_alloc\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kfree\x00', r9}, 0x18) syz_clone(0x10102000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 15.40607ms ago: executing program 5 (id=21147): mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x29, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0xa, 0xe, 0x8, 0xffff0000}, @map_val={0x18, 0x1d, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_fd={0x18, 0x5, 0x1, 0x0, 0x1}, @func, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x0, 0x1, 0x4, 0x8, 0x1, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000200)='syzkaller\x00', 0x7fffffff, 0x2e, &(0x7f0000000240)=""/46, 0x40f00, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x9, 0x200, 0x200}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x3}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@map=0x1, 0x32, 0x1, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={@cgroup=r0, r1, 0x2d, 0x8, 0x0, @void, @value, @void, @void, r3}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x17, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x3, 0x1, 0x2, 0x6, 0x5, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x9}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, &(0x7f0000000680), 0x0, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x3, 0x7, 0x200}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000740)=[r2, 0x1, r2, r2, r2, r2, r2], &(0x7f0000000780)=[{0x2, 0x3, 0xf, 0xb}, {0x2, 0x1, 0xf, 0x3}], 0x10, 0xfffffffa}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000880)={@cgroup=r0, r1, 0x1d, 0x9, r4, @void, @value=r1, @void, @void, r3}, 0x20) r5 = openat$cgroup_ro(r0, &(0x7f00000008c0)='blkio.bfq.sectors\x00', 0x0, 0x0) r6 = syz_clone(0x8210800, &(0x7f0000000900)="07ff08053d565dfbd60dc2cd", 0xc, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="df97cf915660cd58f6723d3724fd3dbcccdca026d5dd1e8da1cf26080c660531bda3f651985685a69de220acba17c78c05ecc0d83ff1c5747c2d1a4bbee6bb444a356c685038536221eb4bb27d2ec121f4d87bd2751690ce0e585b") write$cgroup_pid(r2, &(0x7f0000000a40)=r6, 0x12) openat$cgroup_procs(r0, &(0x7f0000000a80)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000ac0), 0x9) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000b00)=r4, 0x4) r7 = perf_event_open(&(0x7f0000000b40)={0x2, 0x80, 0x7, 0xf9, 0x6, 0x5, 0x0, 0xe, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x6, 0x101}, 0x800, 0x5, 0x3, 0x7, 0x1, 0x80, 0x8, 0x0, 0x2, 0x0, 0x7f}, r6, 0x2, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000bc0)='blkio.bfq.sectors\x00') r8 = perf_event_open(&(0x7f0000000c00)={0x2, 0x80, 0xff, 0x4a, 0xe, 0x5, 0x0, 0x7fcefd18, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x7fff, 0x488}, 0x200, 0x7ff, 0x401, 0x8, 0x0, 0xff, 0x7, 0x0, 0xeea0, 0x0, 0x4}, r6, 0xc, r7, 0xa) close(r0) syz_clone(0x800, &(0x7f0000000c80)="4570fa8ef138ffac029b279e0631ab08549ed8f26fd9d99cff85ad7b7afd9c6dfaf3800c7db10e01376ca5fe268b8623826db9ae0ddca0e2b866c839b5c2b30ec0f931b802a17d7b01edcc09a951e093d54842ea52dd1d8163a95df003f2b0c20cc9fa26c82c344e9a82a7b2ca2f992d377add70fb949a7b5eddbb1ae834e80190a02f1425cc79af7d8b12783765ff68c778425898f4e296a7ca4915e7cb6600ce581ef0c31eba4123b21d81edb9c1f49e8a69924bc6867d00e82995cb1f20015e1223e9b6", 0xc5, &(0x7f0000000d80), &(0x7f0000000dc0), &(0x7f0000000e00)="e141a75cb481d4add9dca3239859e019ecc871150d66a25c6dfd07968c86138f3d7237289456233aeffbbdfad2c1dc95d69c898c608947a52f6a08696053aacfe394614ad6c0496a5a7a9b5e6c0c7444df1a30bc928bc559662254facaea7627cff41e813006f0eee143fc65334780e70cdac8d90b1038258e86cee9982eec5d44340e6a9e9d2821c181cca75798709f27b819db36068381e9bde806b390bc3859de9fdf70458408ef2edc89faa64748933cf6e94a4c1cf8dfa37808f7ff33cfe5a2ece2d16f4032d3293a792a88") r9 = openat$cgroup_procs(r2, &(0x7f0000000f00)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000f40)=r5, 0x4) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000015c0)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x9, '\x00', 0x0, r5, 0x1, 0x1, 0x2}, 0x50) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001640)={0xffffffffffffffff, 0x92, 0x10}, 0xc) sendmsg$unix(r5, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000f80)="e757359699367fd402b47afedd138d9c9737696eb8908a18b3a6494db486bf6dbcfcdb9d5c742134072c1cc1f92c971afd215750d09e7d102dc9defb8d5074375332181990d1bd3456c40ced2c5cec95e398d1051d91fbddf045e2c0a95100c6f17aac22919a36cbee0b4dea5c106b20c11a0c6e0cb90f8a9faec7", 0x7b}, {&(0x7f0000001000)="799d3a94992dc24295", 0x9}, {&(0x7f0000001040)="cbda20aff9870ef8b9de4203e52fe30e22b0b2bacb545933973d2ee9c4e38ba55b745997c2a3b21669b4d4db3c4c6b3804146ddfea8b3212ec46b9c87c0cccbad6a6ed7f19ebb066fb099b649ff0916871ebd5cbb7f52c763b197d6168ce33476810a85f455e24429cb796d7b887065e62344fb2f4ccacdfbae71eb29bb0edfa875993de1ca2dac412507ece1e8165a2e48e23a98c3c1a234ae1a51e8ff2df2be8a2e6a86955148745f08428da2103604a0c8518e7d83daf3ed83e896071afb833704754d6f2383b5bade4aff1bf9269e8f5a4216bc460b27912ac7a457db29d1fbe64cde95aa70a667593a6a8", 0xed}, {&(0x7f0000001140)="794af2f29df23451577ea5344d66add99dc3ef9bdc3b79d06a36b64fa21f32961d35e389104c32dddb4e408cd9a6784d689d4c1026d8c99d13b26eea7b50a8e40b7ec85361ac19dae55ed3", 0x4b}, {&(0x7f00000011c0)="3d591a4810d212310b191fc70e93d38c44f2485c74d61848d70daa301805023d18b329f3b77c224f66cc9ef43258976f51b53126f9ae13d61a5c9c7a567648fd0c0f", 0x42}, {&(0x7f0000001240)="d9ac9a14f473f6de07fde7cde5d92ad2", 0x10}, {&(0x7f0000001280)="d6aaaab43d61a08ec197750dc99cd415ac29f75969e07b8e1805816a", 0x1c}, {&(0x7f00000012c0)="0194db1a2af74923708910e7cfcc032944eb7203c1dac03fdf1a99507cf26ed0be496ed2f5e46483f4730d67c50831be03fcc92032a23692f823fbebd445243aa65682a8c3eab4dbafc98a0c7377890d9a148ba1271c22457b2f8cd52b1363d32f6d91e9fb077484f9", 0x69}, {&(0x7f0000001340)="4a91d01ef3e404e2f9df3c6ac9ec5a0e12ee4dd7185276c0a54ca4b66a5cf6cf678e347423c72548f117e3e0abf1048bbc528a704dc6a446e209a47ec47a0fcd680c6d5e264090ecec33fd35e64b3b63dbad82d17c83fd0accddf73c2314ac298abebc51c5ec8411715693c2b3361123bc6ffb64deac013b2cbe5a14c9a1a38cc6aaeb87", 0x84}, {&(0x7f0000001400)="b44519dd5232f633824ad88092018ce84275bbd1aeafd6811629c90f228d443192b101b0d129cfec453781c0d0d624a55a227475712ddaa1f2e45a0f11ab835bbf51c403e5e897589b8a6f956ed82746aac650322971240b9dd27cae794f2d9c722decc5d6de101396918b5e624a495264dfb17d94f53362fc1c80ea550b6bc93fceaaf9341762cc34286bfd957fa65e168f7325b91c670b1973e0d8a77e23b9eb544cf44123b5d540c15a2c26a8741ea3ee2665498e858ec87a582ec5e91d31dafd31acc4b15b9845b1f21cba90041cde", 0xd1}], 0xa, &(0x7f0000001680)=[@rights={{0x2c, 0x1, 0x1, [r2, r8, r1, r8, r9, r5, r10]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [r1, r8, r0]}}, @rights={{0x18, 0x1, 0x1, [r11, r7]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r6}}}], 0xc8, 0x20000081}, 0x15) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f00000017c0)=r1) close(r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001880)={{r11, 0xffffffffffffffff}, &(0x7f0000001800), &(0x7f0000001840)=r1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001bc0)={r2, 0x58, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r14 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c80)={0x6, 0x25, &(0x7f00000018c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x14b2}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@alu={0x4, 0x1, 0x9, 0x9, 0x7, 0x80, 0x1}, @alu={0x7, 0x0, 0xc, 0xb, 0x7, 0x30, 0x76ff4dbd80140d3a}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2b9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @map_fd={0x18, 0x4, 0x1, 0x0, r2}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffff01}, @jmp={0x5, 0x0, 0x4, 0x2, 0xa, 0xffffffffffffffe0, 0xfffffffffffffff0}, @map_fd={0x18, 0x0, 0x1, 0x0, r5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='GPL\x00', 0xfffffff7, 0xe3, &(0x7f0000001a40)=""/227, 0x41000, 0x65, '\x00', r13, 0x25, r5, 0x8, &(0x7f0000001c00)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001c40)=[r10, r2, r12], 0x0, 0x10, 0xfffffff8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002e80)={r14, 0x0, 0x45, 0x1000, &(0x7f0000001d40)="f56f7ca7033c1f3ab6b21461deb962ae2755df9f6c9ea71b5df45dd6eca62112c8277222c98a3f937e4a575f8f5199fa104f31ea1d45e9692a835159093641e9b9c0979166", &(0x7f0000001dc0)=""/4096, 0x9, 0x0, 0x34, 0x62, &(0x7f0000002dc0)="adad32efe95d1eba42be2096f562dd707ad040f6ac01a8e98ab9fa705ea1d796e89a54f098bb05018b6fd1b108bcdf0806c94ef0", &(0x7f0000002e00)="6278d4a8d87d90653c8f01ff19927c824dc21fa344dbe5d237af94693f3bc3d3e44bac872fcd94f3e856408a51ed10a9f09239b864f351d2ad94235ae091dd84bc5538c920d4a78d15791bfe3878e045f6ac96c5446c26a16f1bd658cb55ff90a5c3", 0x3, 0x0, 0x780}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000002f00)='\x00') 15.01044ms ago: executing program 5 (id=21148): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9f7844095c68b7e88b0a6e85e36c2e07eb010018000000000000000c0000000c0000000700000005000000"], &(0x7f0000000200)=""/144, 0x2b, 0x90, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x2, 0x4, 0x404, 0x9}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x3, 0x4, 0x801, 0x1, r1, 0x15b4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r1}, 0x20) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x64b}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r2, &(0x7f0000000900)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001400)=@base={0xb, 0x6, 0x4, 0x3a7, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x8, 0x6, &(0x7f0000000b00)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f0000000a00)=""/210, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffce5}, 0xa5) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xf, 0x0, &(0x7f0000000040)="259af271a76d2688ca4c6588a800d8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x50) socketpair(0x11, 0x3, 0x300, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r9) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r10, 0x8943, &(0x7f0000000300)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r9, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r4}, 0x8) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x100600, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfdd9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) 0s ago: executing program 6 (id=20962): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) kernel console output (not intermixed with test programs): 25.239603][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1025.249362][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1025.286945][T17464] device veth0_vlan entered promiscuous mode [ 1025.301180][T17464] device veth1_macvtap entered promiscuous mode [ 1025.341183][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1025.349759][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1025.358780][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1025.367642][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1025.376131][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1025.384309][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1025.392011][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1025.404413][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1025.453897][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1025.497640][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1025.515834][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1025.608632][ T9] device veth0_vlan left promiscuous mode [ 1026.416532][T17541] device veth0_vlan left promiscuous mode [ 1026.431066][T17541] device veth0_vlan entered promiscuous mode [ 1026.445002][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1026.456692][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1026.481518][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1026.746897][T17586] device pim6reg1 entered promiscuous mode [ 1026.947367][T17620] tap0: tun_chr_ioctl cmd 1074025677 [ 1026.962964][T17620] tap0: linktype set to 778 [ 1027.051612][T17617] bridge0: port 1(bridge_slave_0) entered blocking state [ 1027.058919][T17617] bridge0: port 1(bridge_slave_0) entered disabled state [ 1027.066875][T17617] device bridge_slave_0 entered promiscuous mode [ 1027.146982][T17617] bridge0: port 2(bridge_slave_1) entered blocking state [ 1027.154348][T17617] bridge0: port 2(bridge_slave_1) entered disabled state [ 1027.163171][T17617] device bridge_slave_1 entered promiscuous mode [ 1027.549584][T17617] bridge0: port 2(bridge_slave_1) entered blocking state [ 1027.556786][T17617] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1027.564149][T17617] bridge0: port 1(bridge_slave_0) entered blocking state [ 1027.571305][T17617] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1027.606703][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1027.624364][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1027.649034][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1027.689065][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1027.710176][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1027.717289][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1027.752051][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1027.771341][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 1027.778453][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1027.855430][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1027.881354][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1027.927092][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1027.951394][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1027.964157][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1027.984672][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1028.002397][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1028.031741][T17617] device veth0_vlan entered promiscuous mode [ 1028.106483][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1028.121112][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1028.137202][T17617] device veth1_macvtap entered promiscuous mode [ 1028.145178][T17673] device wg2 left promiscuous mode [ 1028.179313][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1028.193828][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1028.210016][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1028.219551][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1028.228897][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1028.547744][T17702] device veth0_vlan left promiscuous mode [ 1028.559223][T17702] device veth0_vlan entered promiscuous mode [ 1028.607152][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1028.618966][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1028.644543][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1028.697690][ T9] GPL: port 1(erspan0) entered disabled state [ 1028.723046][ T9] device erspan0 left promiscuous mode [ 1028.730967][ T9] GPL: port 1(erspan0) entered disabled state [ 1028.834150][T17722] device pim6reg1 entered promiscuous mode [ 1029.080801][ T9] device veth0_vlan left promiscuous mode [ 1029.476429][T17742] device sit0 left promiscuous mode [ 1029.520652][T17745] device sit0 entered promiscuous mode [ 1029.797366][T17769] device sit0 left promiscuous mode [ 1029.828259][T17769] device sit0 entered promiscuous mode [ 1029.975804][T17773] device veth1_macvtap left promiscuous mode [ 1029.991106][T17773] device macsec0 entered promiscuous mode [ 1030.298192][T17791] syz.1.14246[17791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1030.298548][T17791] syz.1.14246[17791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1030.632833][T17802] bridge0: port 1(bridge_slave_0) entered blocking state [ 1030.670435][T17802] bridge0: port 1(bridge_slave_0) entered disabled state [ 1030.678906][T17802] device bridge_slave_0 entered promiscuous mode [ 1030.688060][T17802] bridge0: port 2(bridge_slave_1) entered blocking state [ 1030.695721][T17802] bridge0: port 2(bridge_slave_1) entered disabled state [ 1030.704086][T17802] device bridge_slave_1 entered promiscuous mode [ 1031.016228][T17802] bridge0: port 2(bridge_slave_1) entered blocking state [ 1031.023550][T17802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1031.030849][T17802] bridge0: port 1(bridge_slave_0) entered blocking state [ 1031.037934][T17802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1031.092738][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1031.103835][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1031.298096][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1031.323937][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1031.411249][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1031.423921][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1031.438519][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1031.445831][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1031.454538][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1031.462976][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1031.472172][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 1031.479233][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1031.509301][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1031.524001][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1031.547755][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1031.571343][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1031.646259][T17802] device veth0_vlan entered promiscuous mode [ 1031.664028][T17885] syz.0.14275[17885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1031.664120][T17885] syz.0.14275[17885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1031.694445][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1031.715400][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1031.724257][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1031.732443][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1031.742958][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1031.751013][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1031.833725][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1031.848831][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1031.885060][T17802] device veth1_macvtap entered promiscuous mode [ 1031.914255][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1031.924001][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1031.970147][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1032.341027][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1032.358022][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1032.385381][T17910] device sit0 left promiscuous mode [ 1032.689861][T17934] device wg2 entered promiscuous mode [ 1033.292311][T17955] device syzkaller0 entered promiscuous mode [ 1033.573464][T17996] device sit0 left promiscuous mode [ 1033.599109][T17996] device syzkaller0 entered promiscuous mode [ 1034.887257][T18037] device pim6reg1 entered promiscuous mode [ 1035.002592][T18040] device pim6reg1 entered promiscuous mode [ 1035.047642][T18056] device syzkaller0 entered promiscuous mode [ 1035.143989][T18069] device pim6reg1 entered promiscuous mode [ 1035.498638][T18135] device veth1_macvtap left promiscuous mode [ 1036.253096][T18182] device macsec0 left promiscuous mode [ 1036.618515][T18195] device syzkaller0 entered promiscuous mode [ 1037.157523][T18235] device pim6reg1 entered promiscuous mode [ 1037.495370][T18262] device veth1_macvtap entered promiscuous mode [ 1037.562849][T18262] device macsec0 entered promiscuous mode [ 1037.644314][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1037.963582][T18304] device syzkaller0 entered promiscuous mode [ 1037.987182][T18302] bridge0: port 1(bridge_slave_0) entered blocking state [ 1037.994531][T18302] bridge0: port 1(bridge_slave_0) entered disabled state [ 1038.002410][T18302] device bridge_slave_0 entered promiscuous mode [ 1038.010412][T18302] bridge0: port 2(bridge_slave_1) entered blocking state [ 1038.017723][T18302] bridge0: port 2(bridge_slave_1) entered disabled state [ 1038.025862][T18302] device bridge_slave_1 entered promiscuous mode [ 1038.198080][T18314] device syzkaller0 entered promiscuous mode [ 1038.260919][T18317] device syzkaller0 entered promiscuous mode [ 1038.356265][T18302] bridge0: port 2(bridge_slave_1) entered blocking state [ 1038.363369][T18302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1038.370646][T18302] bridge0: port 1(bridge_slave_0) entered blocking state [ 1038.377854][T18302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1038.427611][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1038.456495][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 1038.464595][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 1038.527795][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1038.536926][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 1038.544305][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1038.552457][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1038.561257][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 1038.568421][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1038.827265][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1038.836287][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1038.914737][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1038.923177][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1038.965731][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1038.981641][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1039.005757][T18302] device veth0_vlan entered promiscuous mode [ 1039.013705][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1039.028573][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1039.053978][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1039.061773][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1039.128083][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1039.136468][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1039.149272][T18302] device veth1_macvtap entered promiscuous mode [ 1039.220250][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1039.231073][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1039.239855][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1039.275998][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1039.313792][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1039.784563][T18410] device wg2 entered promiscuous mode [ 1039.919871][ T9] device veth0_vlan left promiscuous mode [ 1040.595694][T18439] device syzkaller0 entered promiscuous mode [ 1042.845935][T18621] device syzkaller0 entered promiscuous mode [ 1043.064045][T18651] bridge0: port 2(bridge_slave_1) entered disabled state [ 1043.073412][T18651] bridge0: port 1(bridge_slave_0) entered disabled state [ 1043.225173][T18651] device bridge_slave_1 left promiscuous mode [ 1043.235228][T18651] bridge0: port 2(bridge_slave_1) entered disabled state [ 1043.255488][T18651] device bridge_slave_0 left promiscuous mode [ 1043.262483][T18651] bridge0: port 1(bridge_slave_0) entered disabled state [ 1044.679847][T18702] device veth0_vlan left promiscuous mode [ 1044.690665][T18702] device veth0_vlan entered promiscuous mode [ 1044.809888][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1044.818972][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1044.826919][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1044.835302][T18713] device sit0 entered promiscuous mode [ 1045.090712][T18720] Ÿë: port 1(veth0_to_team) entered blocking state [ 1045.101456][T18720] Ÿë: port 1(veth0_to_team) entered disabled state [ 1045.118236][T18720] device veth0_to_team entered promiscuous mode [ 1045.542389][T18779] syz.3.14528[18779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1045.542484][T18779] syz.3.14528[18779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1045.750387][T18790] device syzkaller0 entered promiscuous mode [ 1045.799206][T18785] device pim6reg1 entered promiscuous mode [ 1045.865965][T15807] syzkaller0: tun_net_xmit 48 [ 1045.900716][T18792] syz.4.14531[18792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1045.900778][T18792] syz.4.14531[18792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1045.963476][T18790] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1045.981504][T18790] syzkaller0: Linktype set failed because interface is up [ 1046.011784][T18796] ÿÿÿÿÿÿ: renamed from vlan1 [ 1046.268826][T18805] device syzkaller0 entered promiscuous mode [ 1046.648812][T18809] device syzkaller0 entered promiscuous mode [ 1047.271740][T18862] device syzkaller0 entered promiscuous mode [ 1047.445708][T18873] device wg2 left promiscuous mode [ 1047.508621][T18886] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1047.520834][T18886] device syzkaller0 entered promiscuous mode [ 1047.712656][T18913] device veth0_vlan left promiscuous mode [ 1047.734511][T18913] device veth0_vlan entered promiscuous mode [ 1047.772763][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1047.796656][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1047.824423][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1048.339162][T18924] device pim6reg1 entered promiscuous mode [ 1048.863900][T18995] device wg2 left promiscuous mode [ 1048.904311][T19010] device wg2 entered promiscuous mode [ 1049.208277][T19036] syz.0.14605[19036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1049.208379][T19036] syz.0.14605[19036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1049.264065][T19038] device wg2 entered promiscuous mode [ 1049.375967][T19042] device wg2 left promiscuous mode [ 1050.377203][T19097] syz.1.14622[19097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1050.486959][T19104] device syzkaller0 entered promiscuous mode [ 1051.097279][T19129] device syzkaller0 entered promiscuous mode [ 1051.312712][T19138] device syzkaller0 entered promiscuous mode [ 1052.027901][T19220] ref_ctr_offset mismatch. inode: 0x1ec offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1052.091074][T19220] GPL: port 1(erspan0) entered blocking state [ 1052.098794][T19220] GPL: port 1(erspan0) entered disabled state [ 1052.127486][T19220] device erspan0 entered promiscuous mode [ 1052.160322][T19231] GPL: port 1(erspan0) entered blocking state [ 1052.166554][T19231] GPL: port 1(erspan0) entered forwarding state [ 1053.230048][T19295] device pim6reg1 entered promiscuous mode [ 1053.260965][T19305] syz.3.14681[19305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1053.261066][T19305] syz.3.14681[19305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1053.280144][T19300] device syzkaller0 entered promiscuous mode [ 1053.305799][T19295] device pim6reg1 left promiscuous mode [ 1053.346495][T19308] sock: sock_set_timeout: `syz.3.14682' (pid 19308) tries to set negative timeout [ 1053.807789][T19334] device wg2 left promiscuous mode [ 1056.670421][T19373] bridge0: port 2(bridge_slave_1) entered disabled state [ 1056.679649][T19373] bridge0: port 1(bridge_slave_0) entered disabled state [ 1056.794997][T19388] ±ÿ: renamed from team_slave_1 [ 1056.834724][T19373] device bridge_slave_1 left promiscuous mode [ 1056.842538][T19373] bridge0: port 2(bridge_slave_1) entered disabled state [ 1056.900891][T19373] device bridge_slave_0 left promiscuous mode [ 1056.935714][T19373] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.212251][T19384] device wg2 entered promiscuous mode [ 1057.257419][T19403] device sit0 left promiscuous mode [ 1057.299230][T19409] device sit0 entered promiscuous mode [ 1057.396905][T19413] device syzkaller0 entered promiscuous mode [ 1057.651187][T19462] device wg2 left promiscuous mode [ 1057.774071][T19461] device wg2 entered promiscuous mode [ 1058.016524][T19485] device wg2 entered promiscuous mode [ 1058.070000][T19493] device syzkaller0 entered promiscuous mode [ 1058.281880][T19509] device syzkaller0 entered promiscuous mode [ 1061.012470][T19534] device wg2 left promiscuous mode [ 1061.108416][T19545] device wg2 entered promiscuous mode [ 1061.353299][T19548] device pim6reg1 entered promiscuous mode [ 1063.667887][T19747] device veth1_macvtap left promiscuous mode [ 1063.674079][T19747] device macsec0 left promiscuous mode [ 1063.812297][T19769] device syzkaller0 entered promiscuous mode [ 1063.917235][T19796] device pim6reg1 entered promiscuous mode [ 1064.144077][T19833] device pim6reg1 entered promiscuous mode [ 1064.907473][T19860] device pim6reg1 entered promiscuous mode [ 1064.972096][T19862] syz.0.14839[19862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1064.972156][T19862] syz.0.14839[19862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1065.018211][T19862] device wg2 entered promiscuous mode [ 1065.145689][T19873] device syzkaller0 entered promiscuous mode [ 1065.670820][T19894] device syzkaller0 entered promiscuous mode [ 1066.360949][T19913] device syzkaller0 entered promiscuous mode [ 1068.280495][T20053] @ÿ: renamed from bond_slave_0 [ 1069.428463][T20076] device pim6reg1 entered promiscuous mode [ 1069.959036][T20109] ip6erspan0: tun_chr_ioctl cmd 1074025677 [ 1069.965420][T20109] ip6erspan0: linktype set to 805 [ 1070.605363][T20140] device pim6reg1 entered promiscuous mode [ 1073.452951][T20296] device sit0 entered promiscuous mode [ 1075.074095][T20344] device syzkaller0 entered promiscuous mode [ 1075.494997][T20356] device pim6reg1 entered promiscuous mode [ 1075.720075][T20369] device veth0_vlan left promiscuous mode [ 1075.764106][T20369] device veth0_vlan entered promiscuous mode [ 1075.772144][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1075.780903][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1075.789437][T20376] syz.2.14985[20376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1075.789493][T20376] syz.2.14985[20376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1075.802081][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1075.824146][T20379] syz.2.14985[20379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1075.824205][T20379] syz.2.14985[20379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1075.843906][T20379] syz.2.14985[20379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1076.313708][T20415] device wg2 left promiscuous mode [ 1076.354414][T20415] device wg2 entered promiscuous mode [ 1076.831581][T20450] device wg2 entered promiscuous mode [ 1076.889599][T20456] device macsec0 entered promiscuous mode [ 1076.905390][T20458] device veth0_vlan left promiscuous mode [ 1076.924406][T20458] device veth0_vlan entered promiscuous mode [ 1076.961185][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1076.983879][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1077.022026][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1077.115214][T20465] device syzkaller0 entered promiscuous mode [ 1077.269623][T20484] syzkaller0: refused to change device tx_queue_len [ 1077.348471][T20500] device syzkaller0 entered promiscuous mode [ 1077.555987][T20525] device syzkaller0 entered promiscuous mode [ 1077.580891][T20527] device sit0 left promiscuous mode [ 1077.596821][T20527] device sit0 entered promiscuous mode [ 1078.900624][T20597] device wg2 left promiscuous mode [ 1079.871247][T20673] device veth1_macvtap left promiscuous mode [ 1079.913436][T20681] device veth1_macvtap entered promiscuous mode [ 1079.933520][T20681] device macsec0 entered promiscuous mode [ 1080.017012][T20694] GPL: port 1(erspan0) entered blocking state [ 1080.023286][T20694] GPL: port 1(erspan0) entered disabled state [ 1080.053880][T20694] device erspan0 entered promiscuous mode [ 1080.109150][T20697] GPL: port 1(erspan0) entered blocking state [ 1080.115272][T20697] GPL: port 1(erspan0) entered forwarding state [ 1081.168882][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 1081.525335][T20802] device syzkaller0 entered promiscuous mode [ 1082.047186][T20872] syz.1.15126[20872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1082.047255][T20872] syz.1.15126[20872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1082.565937][T20928] device syzkaller0 entered promiscuous mode [ 1083.293817][T20978] device veth0_vlan left promiscuous mode [ 1083.364330][T20978] device veth0_vlan entered promiscuous mode [ 1083.452878][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1083.468530][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1083.489605][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1083.891277][T21001] device pim6reg1 entered promiscuous mode [ 1084.517150][T21034] device pim6reg1 entered promiscuous mode [ 1085.798976][T21119] device pim6reg1 entered promiscuous mode [ 1086.958226][T21184] syz.1.15215[21184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1086.958300][T21184] syz.1.15215[21184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1087.020443][T21184] device pim6reg1 entered promiscuous mode [ 1087.586520][T21207] device syzkaller0 entered promiscuous mode [ 1088.098639][T21269] syz.2.15237[21269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1088.098700][T21269] syz.2.15237[21269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1088.538019][T21297] device sit0 entered promiscuous mode [ 1089.644935][T21390] device wg2 left promiscuous mode [ 1089.709873][T21396] device pim6reg1 entered promiscuous mode [ 1090.376537][T21422] device syzkaller0 entered promiscuous mode [ 1090.770520][T21438] device wg2 left promiscuous mode [ 1090.855339][T21438] device veth1_to_team entered promiscuous mode [ 1090.887020][T21438] device wg2 entered promiscuous mode [ 1091.149407][T21476] device pim6reg1 entered promiscuous mode [ 1092.075553][T21514] bridge0: port 2(bridge_slave_1) entered disabled state [ 1092.082797][T21514] bridge0: port 1(bridge_slave_0) entered disabled state [ 1092.130299][T21515] device bridge_slave_1 left promiscuous mode [ 1092.154036][T21515] bridge0: port 2(bridge_slave_1) entered disabled state [ 1092.198597][T21515] device bridge_slave_0 left promiscuous mode [ 1092.214201][T21515] bridge0: port 1(bridge_slave_0) entered disabled state [ 1092.414719][T21530] device pim6reg1 entered promiscuous mode [ 1092.453889][T21525] device pim6reg1 entered promiscuous mode [ 1092.900993][T21564] device pim6reg1 entered promiscuous mode [ 1094.771324][T21640] device wg2 entered promiscuous mode [ 1095.909704][T21725] device wg2 left promiscuous mode [ 1096.137706][T21754] device veth1_macvtap left promiscuous mode [ 1096.171724][T21754] device veth1_macvtap entered promiscuous mode [ 1096.213441][T21754] device macsec0 entered promiscuous mode [ 1096.221740][T21756] device veth0_vlan left promiscuous mode [ 1096.241916][T21756] device veth0_vlan entered promiscuous mode [ 1096.286655][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1096.298465][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1096.314834][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1096.384343][T21770] device syzkaller0 entered promiscuous mode [ 1096.390484][T21770] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1097.068192][T21796] device pim6reg1 entered promiscuous mode [ 1097.183944][T21811] bridge0: port 2(bridge_slave_1) entered disabled state [ 1097.191259][T21811] bridge0: port 1(bridge_slave_0) entered disabled state [ 1097.308414][T21815] syz.0.15403[21815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1097.308493][T21815] syz.0.15403[21815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1097.622947][T21813] device syzkaller0 entered promiscuous mode [ 1097.914249][T21845] device wg2 entered promiscuous mode [ 1098.790123][T21871] device syzkaller0 entered promiscuous mode [ 1099.966291][T21959] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1099.972179][T21959] syzkaller0: linktype set to 804 [ 1100.114501][T21976] device pim6reg1 entered promiscuous mode [ 1100.522404][T22019] lo: mtu less than device minimum [ 1100.754318][T22040] syz.0.15464[22040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1100.754377][T22040] syz.0.15464[22040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1100.943231][T22050] device sit0 left promiscuous mode [ 1100.967722][T22053] syz.0.15468[22053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1100.967810][T22053] syz.0.15468[22053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1101.488394][T22068] device veth0_vlan left promiscuous mode [ 1101.541605][T22068] device veth0_vlan entered promiscuous mode [ 1101.613835][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1101.622714][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1101.639066][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1103.138586][T22168] syz.3.15500[22168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1103.138644][T22168] syz.3.15500[22168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1103.461282][T22204] device pim6reg1 entered promiscuous mode [ 1104.276259][T22290] device pim6reg1 entered promiscuous mode [ 1107.348916][T22475] device syzkaller0 entered promiscuous mode [ 1108.634982][T22561] syz.4.15612[22561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1108.635063][T22561] syz.4.15612[22561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1109.279656][T22636] syz.2.15635[22636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1109.291579][T22636] syz.2.15635[22636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1109.648816][T22653] device syzkaller0 entered promiscuous mode [ 1109.764957][T22659] bridge0: port 2(bridge_slave_1) entered disabled state [ 1109.973045][T22673] device syzkaller0 entered promiscuous mode [ 1110.111653][T22689] device sit0 entered promiscuous mode [ 1110.370384][T22725] device pim6reg1 entered promiscuous mode [ 1110.525081][T22747] device syzkaller0 entered promiscuous mode [ 1110.535738][T22745] device pim6reg1 entered promiscuous mode [ 1110.725382][T22759] device syzkaller0 entered promiscuous mode [ 1111.359325][T22800] device pim6reg1 entered promiscuous mode [ 1113.035022][T22899] device sit0 left promiscuous mode [ 1113.155285][T22899] device sit0 entered promiscuous mode [ 1115.711068][T23039] device bridge_slave_1 left promiscuous mode [ 1115.745884][T23039] bridge0: port 2(bridge_slave_1) entered disabled state [ 1115.784061][T23039] device bridge_slave_0 left promiscuous mode [ 1115.805717][T23039] bridge0: port 1(bridge_slave_0) entered disabled state [ 1115.912567][T23058] device syzkaller0 entered promiscuous mode [ 1116.249738][T23076] syz.3.15768[23076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1116.249800][T23076] syz.3.15768[23076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1117.025577][T23153] device sit0 left promiscuous mode [ 1117.151099][T23154] device sit0 entered promiscuous mode [ 1118.119366][T23178] device pim6reg1 entered promiscuous mode [ 1118.662122][T23196] device sit0 left promiscuous mode [ 1118.894842][T23220] device veth1_to_team entered promiscuous mode [ 1118.951525][T23220] device wg2 entered promiscuous mode [ 1119.796451][T23284] device syzkaller0 entered promiscuous mode [ 1119.824963][T23288] device syzkaller0 entered promiscuous mode [ 1119.955877][T23301] device wg2 entered promiscuous mode [ 1120.111458][T23312] device sit0 entered promiscuous mode [ 1120.397071][T23319] syz.1.15836[23319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1120.397177][T23319] syz.1.15836[23319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1121.418480][T23358] device syzkaller0 entered promiscuous mode [ 1121.479344][T23386] device syzkaller0 entered promiscuous mode [ 1121.665938][T23407] device veth0_vlan left promiscuous mode [ 1121.672326][T23407] device veth0_vlan entered promiscuous mode [ 1121.679497][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1121.687861][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1121.695856][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1121.901669][T23420] device syzkaller0 entered promiscuous mode [ 1121.926849][T23422] device veth0_vlan left promiscuous mode [ 1121.940168][T23422] device veth0_vlan entered promiscuous mode [ 1121.974729][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1121.987494][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1121.997441][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1122.363817][T23474] device sit0 left promiscuous mode [ 1122.556029][T23481] device sit0 entered promiscuous mode [ 1123.022728][T23518] device pim6reg1 entered promiscuous mode [ 1124.574623][T23618] device veth0_vlan left promiscuous mode [ 1124.605957][T23618] device veth0_vlan entered promiscuous mode [ 1124.700119][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1124.721468][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1124.786786][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1124.829398][T23627] device sit0 left promiscuous mode [ 1124.949789][T23640] device veth1_macvtap left promiscuous mode [ 1124.979099][T23640] device macsec0 left promiscuous mode [ 1125.286871][T23667] device sit0 entered promiscuous mode [ 1125.563378][T23693] device xfrm0 entered promiscuous mode [ 1125.721147][T23717] syz.0.15948[23717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1125.721209][T23717] syz.0.15948[23717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1125.898539][T23729] device veth0_vlan left promiscuous mode [ 1125.934099][T23729] device veth0_vlan entered promiscuous mode [ 1125.941245][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1125.963192][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1125.982142][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1126.070509][T23737] device pim6reg1 entered promiscuous mode [ 1126.599013][T23761] device syzkaller0 entered promiscuous mode [ 1128.944683][T23940] device sit0 entered promiscuous mode [ 1129.102388][T23963] device pim6reg1 entered promiscuous mode [ 1129.216083][T23969] device veth0_vlan left promiscuous mode [ 1129.288407][T23969] device veth0_vlan entered promiscuous mode [ 1129.392164][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1129.421895][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1129.459155][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1130.394271][T24030] device sit0 left promiscuous mode [ 1130.564964][T24035] device sit0 entered promiscuous mode [ 1130.780559][T24043] device veth0_vlan left promiscuous mode [ 1130.810631][T24043] device veth0_vlan entered promiscuous mode [ 1131.200386][T24079] device pim6reg1 entered promiscuous mode [ 1131.238296][T24084] device syzkaller0 entered promiscuous mode [ 1131.807004][T24117] syz.1.16059[24117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1131.807085][T24117] syz.1.16059[24117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1132.406753][T24174] lo: mtu less than device minimum [ 1132.968222][T24234] device sit0 entered promiscuous mode [ 1132.983507][T24244] device pim6reg1 entered promiscuous mode [ 1133.223869][T24250] ÿÿÿÿÿÿ: renamed from vlan1 [ 1133.975980][T24280] device veth0_vlan left promiscuous mode [ 1133.989633][T24280] device veth0_vlan entered promiscuous mode [ 1134.018441][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1134.033025][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1134.041582][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1134.236399][T24306] device wg2 left promiscuous mode [ 1134.251376][T24304] device pim6reg1 entered promiscuous mode [ 1134.304490][T24306] device wg2 entered promiscuous mode [ 1134.468081][T24338] device pim6reg1 entered promiscuous mode [ 1135.572739][T24412] device syzkaller0 entered promiscuous mode [ 1135.807191][T24437] syz.3.16153[24437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1135.807240][T24437] syz.3.16153[24437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1135.920114][T24444] device syzkaller0 entered promiscuous mode [ 1139.348294][T24689] pim6reg0: tun_chr_ioctl cmd 3221517374 [ 1139.523493][T24710] Â: renamed from pim6reg1 [ 1141.566626][T24779] device pim6reg1 entered promiscuous mode [ 1141.863886][T24820] device pim6reg1 entered promiscuous mode [ 1141.973107][T24828] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 1142.281840][T24849] device wg2 left promiscuous mode [ 1142.437950][T24859] device sit0 left promiscuous mode [ 1142.490228][T24863] device veth0_vlan left promiscuous mode [ 1142.499529][T24863] device veth0_vlan entered promiscuous mode [ 1142.507448][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1142.525935][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1142.536537][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1142.916225][T17617] cgroup: fork rejected by pids controller in /syz0 [ 1143.358665][T24900] @0Ù: renamed from bond_slave_1 [ 1143.682946][T24906] bridge0: port 1(bridge_slave_0) entered blocking state [ 1143.749153][T24906] bridge0: port 1(bridge_slave_0) entered disabled state [ 1143.823805][T24906] device bridge_slave_0 entered promiscuous mode [ 1143.853713][T24906] bridge0: port 2(bridge_slave_1) entered blocking state [ 1143.903779][T24906] bridge0: port 2(bridge_slave_1) entered disabled state [ 1143.911277][T24906] device bridge_slave_1 entered promiscuous mode [ 1144.282286][T24906] bridge0: port 2(bridge_slave_1) entered blocking state [ 1144.289378][T24906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1144.296769][T24906] bridge0: port 1(bridge_slave_0) entered blocking state [ 1144.303813][T24906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1144.534236][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1144.542690][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1144.559595][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1144.568097][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1144.581383][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1144.590472][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1144.608653][T24936] device pim6reg1 entered promiscuous mode [ 1144.659035][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1144.667894][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1144.824769][T24906] device veth0_vlan entered promiscuous mode [ 1144.902089][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1144.926068][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1144.952888][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1144.969356][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1144.990280][T24906] device veth1_macvtap entered promiscuous mode [ 1145.034037][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1145.043718][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1145.063710][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1145.072006][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1145.080942][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1145.094138][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1145.106353][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1145.123874][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1145.142319][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1145.299278][ T7] GPL: port 1(erspan0) entered disabled state [ 1145.315952][ T7] device erspan0 left promiscuous mode [ 1145.336941][ T7] GPL: port 1(erspan0) entered disabled state [ 1145.367498][T24973] device sit0 left promiscuous mode [ 1145.746440][ T7] device bridge_slave_1 left promiscuous mode [ 1145.752737][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1145.775005][ T7] device bridge_slave_0 left promiscuous mode [ 1145.782307][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1145.795554][ T7] device veth1_macvtap left promiscuous mode [ 1146.076319][T25000] device wg2 entered promiscuous mode [ 1146.242945][T25012] device syzkaller0 entered promiscuous mode [ 1146.323276][T25033] device syzkaller0 entered promiscuous mode [ 1146.401022][T25037] device syzkaller0 entered promiscuous mode [ 1146.487323][T25049] syz.1.16329[25049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1146.487414][T25049] syz.1.16329[25049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1146.938427][T25094] device pim6reg1 entered promiscuous mode [ 1148.087653][T25172] device sit0 left promiscuous mode [ 1148.103160][T25169] device pim6reg1 entered promiscuous mode [ 1148.135938][T25169] device syzkaller0 entered promiscuous mode [ 1148.153510][T25173] device sit0 entered promiscuous mode [ 1148.950764][T25227] device veth0_vlan left promiscuous mode [ 1148.957591][T25227] device veth0_vlan entered promiscuous mode [ 1150.588824][T25317] device syzkaller0 entered promiscuous mode [ 1151.824334][T25378] syz.2.16423[25378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1151.825557][T25378] syz.2.16423[25378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1151.870256][T25390] syz.2.16423[25390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1151.913477][T25390] syz.2.16423[25390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1152.242334][T25407] device pim6reg1 entered promiscuous mode [ 1152.419310][T25409] device syzkaller0 entered promiscuous mode [ 1152.455569][T25411] device syzkaller0 entered promiscuous mode [ 1152.995521][T25449] device syzkaller0 entered promiscuous mode [ 1153.750969][T25524] syz.3.16457[25524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1153.923575][T25526] device pim6reg1 entered promiscuous mode [ 1154.300812][T25556] device wg2 entered promiscuous mode [ 1155.382353][T25587] device syzkaller0 entered promiscuous mode [ 1155.519058][T25609] device sit0 left promiscuous mode [ 1155.635590][T25609] device sit0 entered promiscuous mode [ 1156.529607][T25660] device pim6reg1 entered promiscuous mode [ 1156.647772][T25663] device syzkaller0 entered promiscuous mode [ 1160.008610][T25862] device pim6reg1 entered promiscuous mode [ 1160.602666][T25905] device macsec0 entered promiscuous mode [ 1161.035020][T25944] device syzkaller0 entered promiscuous mode [ 1161.343732][T25960] device sit0 left promiscuous mode [ 1161.628268][T25980] device wg2 left promiscuous mode [ 1161.659907][T25984] device syzkaller0 entered promiscuous mode [ 1161.709625][T25983] device veth1_macvtap entered promiscuous mode [ 1162.749716][T26045] syz.1.16617[26045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1162.749805][T26045] syz.1.16617[26045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1162.890591][T26054] syz.0.16619[26054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1162.933171][T26054] syz.0.16619[26054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1163.102083][T26085] device pim6reg1 entered promiscuous mode [ 1163.140152][T26100] syz.2.16631[26100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1163.140208][T26100] syz.2.16631[26100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1163.344667][T26117] device wg2 left promiscuous mode [ 1163.424236][T26100] device veth0_vlan left promiscuous mode [ 1163.443273][T26100] device veth0_vlan entered promiscuous mode [ 1163.480296][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1163.497429][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1163.506881][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1164.192741][T26177] device syzkaller0 entered promiscuous mode [ 1164.376054][T26205] device wg2 left promiscuous mode [ 1165.052139][T26235] device pim6reg1 entered promiscuous mode [ 1167.038330][T26318] device pim6reg1 entered promiscuous mode [ 1167.160475][T26327] syz.0.16692[26327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1167.160543][T26327] syz.0.16692[26327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1167.196726][T26329] device sit0 left promiscuous mode [ 1167.325336][T26345] device sit0 entered promiscuous mode [ 1168.067970][T26389] device syzkaller0 entered promiscuous mode [ 1168.257328][T26416] bridge0: port 2(bridge_slave_1) entered disabled state [ 1168.264967][T26416] bridge0: port 1(bridge_slave_0) entered disabled state [ 1169.538939][T26470] device pim6reg1 entered promiscuous mode [ 1169.905903][T26479] device syzkaller0 entered promiscuous mode [ 1170.546820][T26537] device sit0 entered promiscuous mode [ 1170.557119][T26539] syz.4.16751[26539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1170.557180][T26539] syz.4.16751[26539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1171.635919][T26601] device syzkaller0 entered promiscuous mode [ 1171.771464][T26619] device sit0 entered promiscuous mode [ 1172.128896][T26642] device sit0 entered promiscuous mode [ 1172.259755][T26661] device pim6reg1 entered promiscuous mode [ 1172.410661][T26683] device veth1_to_bond entered promiscuous mode [ 1173.428114][T26725] device syzkaller0 entered promiscuous mode [ 1174.167897][T26794] device sit0 left promiscuous mode [ 1174.206547][T26794] device sit0 entered promiscuous mode [ 1174.767531][T26812] device pim6reg1 entered promiscuous mode [ 1175.536170][T26859] syz.4.16844[26859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1175.536231][T26859] syz.4.16844[26859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1175.765125][T26876] bridge0: port 2(bridge_slave_1) entered blocking state [ 1175.783687][T26876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1175.790976][T26876] bridge0: port 1(bridge_slave_0) entered blocking state [ 1175.798029][T26876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1175.821188][T26876] device bridge0 entered promiscuous mode [ 1176.084061][T26900] device sit0 left promiscuous mode [ 1176.253125][T26908] device sit0 entered promiscuous mode [ 1176.268394][T26932] device sit0 entered promiscuous mode [ 1176.583366][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1176.680560][T26975] device pim6reg1 entered promiscuous mode [ 1176.841976][T26979] device veth1_macvtap left promiscuous mode [ 1177.030243][T26990] device pim6reg1 entered promiscuous mode [ 1177.402968][T27019] device syzkaller0 entered promiscuous mode [ 1177.462409][T27023] device sit0 left promiscuous mode [ 1177.603724][T27042] device sit0 left promiscuous mode [ 1177.752501][T27050] device syzkaller0 entered promiscuous mode [ 1177.786846][T27034] device sit0 entered promiscuous mode [ 1178.558181][T27104] device pim6reg1 entered promiscuous mode [ 1178.762668][T27134] device macsec0 left promiscuous mode [ 1178.831730][T27134] device veth1_macvtap entered promiscuous mode [ 1178.839839][T27134] device macsec0 entered promiscuous mode [ 1178.867905][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1179.092442][T27154] device sit0 entered promiscuous mode [ 1180.051184][T27185] device syzkaller0 entered promiscuous mode [ 1182.230538][T27209] device sit0 left promiscuous mode [ 1182.252643][T27209] device sit0 entered promiscuous mode [ 1182.499154][T27231] device wg2 entered promiscuous mode [ 1183.164579][T27301] bridge0: port 1(bridge_slave_0) entered blocking state [ 1183.177133][T27301] bridge0: port 1(bridge_slave_0) entered disabled state [ 1183.191258][T27301] device bridge_slave_0 entered promiscuous mode [ 1183.279026][T27301] bridge0: port 2(bridge_slave_1) entered blocking state [ 1183.291884][T27301] bridge0: port 2(bridge_slave_1) entered disabled state [ 1183.299776][T27301] device bridge_slave_1 entered promiscuous mode [ 1183.467750][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1183.503523][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1183.551009][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1183.582658][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1183.599334][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 1183.606449][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1183.653662][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1183.665490][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1183.683939][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1183.703416][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 1183.710479][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1183.773879][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1183.789639][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1183.804657][T27326] syz.4.16977[27326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1183.804719][T27325] syz.4.16977[27325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1183.804726][T27326] syz.4.16977[27326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1183.852114][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1183.886261][T27301] device veth0_vlan entered promiscuous mode [ 1183.894533][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1183.911147][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1183.935672][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1183.958152][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1183.979834][T27301] device veth1_macvtap entered promiscuous mode [ 1184.131209][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1184.173923][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1184.281202][T27344] device veth0_vlan left promiscuous mode [ 1184.303722][T27344] device veth0_vlan entered promiscuous mode [ 1184.317581][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1184.331742][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1184.363773][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1184.657811][T25618] device veth1_macvtap left promiscuous mode [ 1185.037746][T27383] device pim6reg1 entered promiscuous mode [ 1185.116151][T27376] bridge0: port 1(bridge_slave_0) entered blocking state [ 1185.123228][T27376] bridge0: port 1(bridge_slave_0) entered disabled state [ 1185.131097][T27376] device bridge_slave_0 entered promiscuous mode [ 1185.138872][T27376] bridge0: port 2(bridge_slave_1) entered blocking state [ 1185.146202][T27376] bridge0: port 2(bridge_slave_1) entered disabled state [ 1185.153870][T27376] device bridge_slave_1 entered promiscuous mode [ 1185.326058][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1185.333888][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1185.360585][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1185.377030][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1185.392568][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 1185.399690][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1185.423442][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1185.433777][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1185.442207][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 1185.449411][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1185.456976][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1185.465549][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1185.504365][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1185.512669][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1185.522505][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1185.540102][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1185.563774][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1185.589468][T27376] device veth0_vlan entered promiscuous mode [ 1185.597871][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1185.607566][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1185.631704][T27376] device veth1_macvtap entered promiscuous mode [ 1185.649675][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1185.663920][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1185.684607][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1185.769643][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1185.782792][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1185.821815][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1185.865686][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1186.876157][T25618] GPL: port 1(erspan0) entered disabled state [ 1186.894278][T25618] device erspan0 left promiscuous mode [ 1186.899846][T25618] GPL: port 1(erspan0) entered disabled state [ 1188.447823][T27573] device syzkaller0 entered promiscuous mode [ 1188.754717][T27617] syz.2.17059[27617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1188.754777][T27617] syz.2.17059[27617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1188.768038][T27617] syz.2.17059[27617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1189.499104][T27654] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 1189.807458][T27635] device syzkaller0 entered promiscuous mode [ 1189.966708][T27673] ªªªªªª: renamed from vlan0 [ 1191.432226][T27795] device wg2 entered promiscuous mode [ 1191.586136][T27825] device syzkaller0 entered promiscuous mode [ 1192.444563][T27857] device wg2 entered promiscuous mode [ 1192.471264][T27864] device pim6reg1 entered promiscuous mode [ 1192.483236][T27867] device pim6reg1 entered promiscuous mode [ 1192.734896][T27890] device pim6reg1 entered promiscuous mode [ 1192.928303][T27897] device veth0_vlan left promiscuous mode [ 1192.948126][T27897] device veth0_vlan entered promiscuous mode [ 1192.981271][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1192.998235][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1193.016206][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1193.047363][T27900] device sit0 entered promiscuous mode [ 1193.902327][T27926] device wg2 entered promiscuous mode [ 1193.936012][T27941] device syzkaller0 entered promiscuous mode [ 1193.963846][T27943] device pim6reg1 entered promiscuous mode [ 1195.501305][T28006] device wg2 left promiscuous mode [ 1195.527677][T28006] device wg2 entered promiscuous mode [ 1195.893449][T28027] device syzkaller0 entered promiscuous mode [ 1196.185562][T28065] device wg2 left promiscuous mode [ 1196.204804][T28065] device wg2 entered promiscuous mode [ 1197.061385][T28091] device veth0_vlan left promiscuous mode [ 1197.093068][T28091] device veth0_vlan entered promiscuous mode [ 1197.146926][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1197.156056][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1197.164149][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1197.213468][T28112] device sit0 left promiscuous mode [ 1197.240177][T28115] device sit0 left promiscuous mode [ 1197.267206][T28114] device veth0_vlan left promiscuous mode [ 1197.276772][T28114] device veth0_vlan entered promiscuous mode [ 1197.287245][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1197.298349][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1197.313405][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1197.335049][T28130] device wg2 left promiscuous mode [ 1197.341772][T28130] syz.1.17216[28130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1197.341833][T28130] syz.1.17216[28130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1197.356781][T28130] syz.1.17216[28130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1197.368988][T28130] syz.1.17216[28130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1197.654526][T28130] device wg2 entered promiscuous mode [ 1198.674632][T28177] device syzkaller0 entered promiscuous mode [ 1199.577297][T28211] device wg2 left promiscuous mode [ 1200.481986][T28258] device pim6reg1 entered promiscuous mode [ 1201.497800][T28299] bridge0: port 1(bridge_slave_0) entered blocking state [ 1201.543922][T28299] bridge0: port 1(bridge_slave_0) entered disabled state [ 1201.551266][T28299] device bridge_slave_0 entered promiscuous mode [ 1201.668657][T28299] bridge0: port 2(bridge_slave_1) entered blocking state [ 1201.676561][T28299] bridge0: port 2(bridge_slave_1) entered disabled state [ 1201.696242][T28299] device bridge_slave_1 entered promiscuous mode [ 1201.872457][T28314] device syzkaller0 entered promiscuous mode [ 1202.038592][T28299] bridge0: port 2(bridge_slave_1) entered blocking state [ 1202.045703][T28299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1202.052976][T28299] bridge0: port 1(bridge_slave_0) entered blocking state [ 1202.060224][T28299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1202.125449][T28324] device pim6reg1 entered promiscuous mode [ 1202.153658][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1202.174322][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1202.182820][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1202.243833][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1202.252168][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1202.260792][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1202.269456][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1202.320808][T28299] device veth0_vlan entered promiscuous mode [ 1202.372302][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1202.382299][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1202.391904][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1202.400201][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1202.409078][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1202.416683][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1202.509884][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1202.533838][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1202.604006][T28299] device veth1_macvtap entered promiscuous mode [ 1202.621691][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1202.629505][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1202.653696][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1202.685708][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1202.713674][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1202.868691][T28359] syz.0.17279[28359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1202.868755][T28359] syz.0.17279[28359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1203.303738][ T307] device veth1_macvtap left promiscuous mode [ 1203.333398][ T307] device veth0_vlan left promiscuous mode [ 1203.525798][T28375] device sit0 entered promiscuous mode [ 1205.767132][T28462] device pim6reg1 entered promiscuous mode [ 1205.876174][T28464] ªªªªªª: renamed from vlan0 [ 1206.643562][T28509] device pim6reg1 entered promiscuous mode [ 1206.801981][T28518] device sit0 entered promiscuous mode [ 1207.265209][T28535] device syzkaller0 entered promiscuous mode [ 1207.512187][T28561] device pim6reg1 entered promiscuous mode [ 1207.806169][T28576] device pim6reg1 entered promiscuous mode [ 1209.620058][T28696] device wg2 entered promiscuous mode [ 1210.549334][T28775] device wg2 left promiscuous mode [ 1210.576234][T28775] device wg2 entered promiscuous mode [ 1210.590321][T28776] device wg2 left promiscuous mode [ 1210.657924][T28780] device veth1_to_team entered promiscuous mode [ 1210.948840][T28783] device syzkaller0 entered promiscuous mode [ 1211.233449][T28814] device sit0 left promiscuous mode [ 1211.302170][T28815] device sit0 entered promiscuous mode [ 1211.964853][T28842] device veth1_macvtap left promiscuous mode [ 1212.316184][T28848] device syzkaller0 entered promiscuous mode [ 1212.581092][T28859] device sit0 entered promiscuous mode [ 1213.328934][T28906] device sit0 left promiscuous mode [ 1213.400713][T28906] device sit0 entered promiscuous mode [ 1213.647751][T28921] device sit0 left promiscuous mode [ 1213.691926][T28923] device sit0 entered promiscuous mode [ 1214.932740][T28992] device pim6reg1 entered promiscuous mode [ 1215.459055][T29001] device sit0 left promiscuous mode [ 1216.040539][T29019] device sit0 entered promiscuous mode [ 1216.214676][T29028] device veth1_macvtap left promiscuous mode [ 1216.220893][T29028] device macsec0 entered promiscuous mode [ 1217.254812][T29080] device syzkaller0 entered promiscuous mode [ 1217.287744][T29082] syz.4.17480[29082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1217.287813][T29082] syz.4.17480[29082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1218.888595][T29177] device veth1_macvtap left promiscuous mode [ 1219.083872][T29190] device pim6reg1 entered promiscuous mode [ 1219.523521][T29207] device syzkaller0 entered promiscuous mode [ 1219.742477][T29222] device syzkaller0 entered promiscuous mode [ 1220.148463][T29252] device pim6reg1 entered promiscuous mode [ 1220.477368][T29276] device pim6reg1 entered promiscuous mode [ 1221.428270][T29344] device sit0 entered promiscuous mode [ 1221.852308][T29373] device veth0_vlan left promiscuous mode [ 1221.876009][T29373] device veth0_vlan entered promiscuous mode [ 1221.905167][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1221.915784][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1221.948718][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1222.033688][T29393] device pim6reg1 entered promiscuous mode [ 1222.090712][T29390] device macsec0 left promiscuous mode [ 1223.533159][T29467] device pim6reg1 entered promiscuous mode [ 1224.118521][T29525] device macsec0 entered promiscuous mode [ 1224.245508][T29537] device pim6reg1 entered promiscuous mode [ 1224.251982][T29539] device pim6reg1 entered promiscuous mode [ 1224.407868][T29550] device sit0 left promiscuous mode [ 1225.252048][T29591] syz.0.17633[29591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1225.252094][T29591] syz.0.17633[29591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1225.317792][T29591] device pim6reg1 entered promiscuous mode [ 1226.119950][T29667] device syzkaller0 entered promiscuous mode [ 1226.908889][T29729] tap0: tun_chr_ioctl cmd 1074025680 [ 1227.042395][T29738] tap0: tun_chr_ioctl cmd 1074025684 [ 1227.246734][T29752] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1227.282338][T29752] device syzkaller0 entered promiscuous mode [ 1227.320977][T29763] syz.0.17688[29763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1227.321038][T29763] syz.0.17688[29763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1228.084364][T29791] device pim6reg1 entered promiscuous mode [ 1228.732059][T29810] bridge0: port 1(bridge_slave_0) entered blocking state [ 1228.745260][T29810] bridge0: port 1(bridge_slave_0) entered disabled state [ 1228.760368][T29810] device bridge_slave_0 entered promiscuous mode [ 1228.782337][T29810] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.809631][T29810] bridge0: port 2(bridge_slave_1) entered disabled state [ 1228.817461][T29810] device bridge_slave_1 entered promiscuous mode [ 1228.937328][T29810] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.944442][T29810] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1228.951738][T29810] bridge0: port 1(bridge_slave_0) entered blocking state [ 1228.959580][T29810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1228.992475][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1229.014038][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 1229.040187][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 1229.074067][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1229.099093][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 1229.106205][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1229.142512][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1229.167353][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 1229.174464][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1229.232599][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1229.291197][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1229.339914][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1229.380121][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1229.390867][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1229.416509][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1229.439049][T29810] device veth0_vlan entered promiscuous mode [ 1229.516155][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1229.535994][T29810] device veth1_macvtap entered promiscuous mode [ 1229.567611][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1229.602604][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1229.621360][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1230.534900][T29869] device wg2 left promiscuous mode [ 1230.603434][T29871] device wg2 entered promiscuous mode [ 1230.747545][ T9] device veth0_to_team left promiscuous mode [ 1230.755962][ T9] Ÿë: port 1(veth0_to_team) entered disabled state [ 1230.797048][ T9] device veth0_vlan left promiscuous mode [ 1231.602558][T29945] bridge0: port 2(bridge_slave_1) entered disabled state [ 1231.609797][T29945] bridge0: port 1(bridge_slave_0) entered disabled state [ 1232.077994][T29979] device pim6reg1 entered promiscuous mode [ 1233.383800][T30006] tap0: tun_chr_ioctl cmd 1074025677 [ 1233.405950][T30006] tap0: linktype set to 773 [ 1233.488686][T30005] device veth0_vlan left promiscuous mode [ 1233.495217][T30005] device veth0_vlan entered promiscuous mode [ 1234.019474][T30039] device pim6reg1 entered promiscuous mode [ 1234.351265][T30065] ÿÿÿÿÿÿ: renamed from vlan1 [ 1235.188959][T30116] device veth0_vlan left promiscuous mode [ 1235.208241][T30116] device veth0_vlan entered promiscuous mode [ 1235.241373][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1235.250308][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1235.259250][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1235.730169][T30177] tun0: tun_chr_ioctl cmd 1074025676 [ 1235.737868][T30177] tun0: owner set to 0 [ 1236.432416][T30227] bridge0: port 2(bridge_slave_1) entered disabled state [ 1236.439678][T30227] bridge0: port 1(bridge_slave_0) entered disabled state [ 1236.512821][T30237] device pim6reg1 entered promiscuous mode [ 1236.654778][T30246] device sit0 left promiscuous mode [ 1236.888392][T30253] device sit0 entered promiscuous mode [ 1237.380382][T30306] device wg2 left promiscuous mode [ 1237.421970][T30312] device veth1_macvtap left promiscuous mode [ 1237.472190][T30310] device wg2 entered promiscuous mode [ 1237.488674][T30317] device veth1_macvtap entered promiscuous mode [ 1237.506804][T30317] device macsec0 entered promiscuous mode [ 1237.569624][T30330] device syzkaller0 entered promiscuous mode [ 1238.699068][T30423] device pim6reg1 entered promiscuous mode [ 1238.806419][T30431] device veth1_macvtap entered promiscuous mode [ 1238.813543][T30431] device macsec0 entered promiscuous mode [ 1238.838565][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1238.985054][T30443] device veth0_vlan left promiscuous mode [ 1239.058649][T30443] device veth0_vlan entered promiscuous mode [ 1240.304338][T30512] device pim6reg1 entered promiscuous mode [ 1240.477005][T30517] device xfrm0 entered promiscuous mode [ 1242.312219][T30588] bridge0: port 1(bridge_slave_0) entered blocking state [ 1242.329458][T30588] bridge0: port 1(bridge_slave_0) entered disabled state [ 1242.337344][T30588] device bridge_slave_0 entered promiscuous mode [ 1242.345115][T30588] bridge0: port 2(bridge_slave_1) entered blocking state [ 1242.352236][T30588] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.359906][T30588] device bridge_slave_1 entered promiscuous mode [ 1242.472052][T30596] bridge0: port 1(bridge_slave_0) entered blocking state [ 1242.479712][T30596] bridge0: port 1(bridge_slave_0) entered disabled state [ 1242.487343][T30596] device bridge_slave_0 entered promiscuous mode [ 1242.506280][T30596] bridge0: port 2(bridge_slave_1) entered blocking state [ 1242.574440][T30596] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.596904][T30596] device bridge_slave_1 entered promiscuous mode [ 1242.676233][T30622] device syzkaller0 entered promiscuous mode [ 1242.748070][T30596] bridge0: port 2(bridge_slave_1) entered blocking state [ 1242.755295][T30596] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1242.762611][T30596] bridge0: port 1(bridge_slave_0) entered blocking state [ 1242.769679][T30596] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1242.818904][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 1242.843976][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.852367][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1242.860962][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1242.889809][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1242.898237][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1242.907376][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 1242.914491][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1242.923103][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1242.935846][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1242.948471][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 1242.955561][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1242.997493][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1243.005468][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1243.016208][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1243.025003][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1243.032951][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1243.041156][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1243.049602][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 1243.056667][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1243.064499][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1243.072808][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 1243.079888][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1243.087526][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1243.101943][T30588] device veth0_vlan entered promiscuous mode [ 1243.115513][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1243.124568][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1243.131952][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1243.140349][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1243.149022][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1243.165550][ T9] device bridge_slave_1 left promiscuous mode [ 1243.171704][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1243.179487][ T9] device bridge_slave_0 left promiscuous mode [ 1243.186106][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1243.194111][ T9] device bridge_slave_1 left promiscuous mode [ 1243.200219][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1243.207666][ T9] device bridge_slave_0 left promiscuous mode [ 1243.214230][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1243.222396][ T9] device veth0_vlan left promiscuous mode [ 1243.228463][ T9] device veth1_macvtap left promiscuous mode [ 1243.420974][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1243.452466][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1243.463210][T30588] device veth1_macvtap entered promiscuous mode [ 1243.477231][T30596] device veth0_vlan entered promiscuous mode [ 1243.483784][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1243.492015][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1243.515704][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1243.524004][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1243.531536][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1243.540998][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1243.550678][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1243.559135][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1243.568164][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1243.576767][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1243.588816][T30596] device veth1_macvtap entered promiscuous mode [ 1243.613925][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1243.622086][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1243.631032][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1243.697054][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1243.706173][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1243.748060][T30646] device sit0 entered promiscuous mode [ 1244.092608][T30680] device wg2 entered promiscuous mode [ 1246.095754][T30766] device pim6reg1 entered promiscuous mode [ 1246.358798][T30783] device syzkaller0 entered promiscuous mode [ 1246.651714][T30794] device syzkaller0 entered promiscuous mode [ 1246.889693][T30830] device wg2 left promiscuous mode [ 1247.072719][T30838] device wg2 entered promiscuous mode [ 1247.342185][T30863] device syzkaller0 entered promiscuous mode [ 1247.516563][T30882] device pim6reg1 entered promiscuous mode [ 1247.719656][T30896] ±ÿ: renamed from team_slave_1 [ 1247.884202][T30903] device syzkaller0 entered promiscuous mode [ 1248.173386][T30914] device syzkaller0 entered promiscuous mode [ 1248.699722][T30953] bridge0: port 2(bridge_slave_1) entered disabled state [ 1248.706952][T30953] bridge0: port 1(bridge_slave_0) entered disabled state [ 1251.280306][T31024] device veth0_vlan left promiscuous mode [ 1251.308674][T31024] device veth0_vlan entered promiscuous mode [ 1251.330221][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1251.342712][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1251.350985][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1252.068359][T31069] device veth0_vlan left promiscuous mode [ 1252.085566][T31069] device veth0_vlan entered promiscuous mode [ 1252.518934][T31112] device syzkaller0 entered promiscuous mode [ 1253.644932][T31199] device pim6reg1 entered promiscuous mode [ 1253.654213][T31194] device sit0 entered promiscuous mode [ 1253.873582][T31218] device syzkaller0 entered promiscuous mode [ 1254.847703][T31249] ªªªªªª: renamed from vlan0 [ 1255.525414][T31303] ªªªªªª: renamed from vlan0 [ 1255.810247][T31333] syz.2.18146[31333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1255.810350][T31333] syz.2.18146[31333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1255.980231][T31339] device sit0 left promiscuous mode [ 1256.121984][T31356] device veth0_vlan left promiscuous mode [ 1256.128217][T31356] device veth0_vlan entered promiscuous mode [ 1256.135979][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1256.163967][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1256.197055][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1257.157859][T31390] device veth0_vlan left promiscuous mode [ 1257.189121][T31390] device veth0_vlan entered promiscuous mode [ 1257.218830][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1257.234383][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1257.246221][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1257.494063][T31413] device syzkaller0 entered promiscuous mode [ 1258.149169][T31467] device syzkaller0 entered promiscuous mode [ 1259.012400][T31545] syz.6.18209[31545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1259.012460][T31545] syz.6.18209[31545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1259.280598][T31572] device sit0 entered promiscuous mode [ 1259.793751][T31588] device syzkaller0 entered promiscuous mode [ 1259.815707][T31620] tap0: tun_chr_ioctl cmd 1074025677 [ 1259.825136][T31620] tap0: linktype set to 780 [ 1260.079339][T31625] device veth1_macvtap left promiscuous mode [ 1260.134412][T31641] device sit0 left promiscuous mode [ 1260.185036][T31641] device sit0 entered promiscuous mode [ 1260.545427][T31650] device wg2 left promiscuous mode [ 1260.741704][T31661] device syzkaller0 entered promiscuous mode [ 1261.222355][T31678] device pim6reg1 entered promiscuous mode [ 1262.214417][T31718] syz.6.18259[31718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1262.214510][T31718] syz.6.18259[31718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1262.333504][T31722] device sit0 left promiscuous mode [ 1262.400302][T31730] device sit0 entered promiscuous mode [ 1264.084455][T31833] syz.3.18292[31833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1264.084556][T31833] syz.3.18292[31833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1264.195457][T31845] device veth0_vlan left promiscuous mode [ 1264.313597][T31845] device veth0_vlan entered promiscuous mode [ 1264.331135][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1264.363909][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1264.420913][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1264.625600][T31858] device pim6reg1 entered promiscuous mode [ 1264.698955][T31862] @ÿ: renamed from bond_slave_0 [ 1265.101782][T31877] device pim6reg1 entered promiscuous mode [ 1266.009142][T31967] device syzkaller0 entered promiscuous mode [ 1266.267725][T31972] device sit0 left promiscuous mode [ 1266.299321][T31976] device syzkaller0 entered promiscuous mode [ 1266.522433][T31996] device veth0_vlan left promiscuous mode [ 1266.537969][T31996] device veth0_vlan entered promiscuous mode [ 1267.327798][T32038] device syzkaller0 entered promiscuous mode [ 1267.407659][T32046] device wg2 entered promiscuous mode [ 1267.736654][T32071] device pim6reg1 entered promiscuous mode [ 1268.440493][T32085] device wg2 left promiscuous mode [ 1269.188869][T32116] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1269.347408][T32121] device wg2 entered promiscuous mode [ 1270.149871][T32141] device sit0 entered promiscuous mode [ 1270.454304][T32145] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.461643][T32145] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.676501][T32155] device pim6reg1 entered promiscuous mode [ 1270.725118][T32169] device wg2 entered promiscuous mode [ 1270.795871][T32182] device syzkaller0 entered promiscuous mode [ 1270.878839][T32186] device syzkaller0 entered promiscuous mode [ 1271.550198][T32220] device veth1_macvtap left promiscuous mode [ 1272.146131][T32236] device veth0_vlan left promiscuous mode [ 1272.233623][T32236] device veth0_vlan entered promiscuous mode [ 1272.385033][T32249] syz.6.18416[32249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1272.385097][T32249] syz.6.18416[32249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1273.221209][T32302] device syzkaller0 entered promiscuous mode [ 1273.895475][T32342] device pim6reg1 entered promiscuous mode [ 1274.969007][T32428] device veth0_vlan left promiscuous mode [ 1274.998061][T32428] device veth0_vlan entered promiscuous mode [ 1275.041208][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1275.051670][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1275.060253][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1275.552975][T32448] device wg2 left promiscuous mode [ 1275.624302][T32448] device bridge0 entered promiscuous mode [ 1276.059703][T32477] syz.3.18484[32477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1276.059789][T32477] syz.3.18484[32477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1277.671771][T32546] device sit0 left promiscuous mode [ 1277.743731][T32546] device sit0 entered promiscuous mode [ 1277.967834][T32564] device pim6reg1 entered promiscuous mode [ 1278.104644][T32563] device sit0 left promiscuous mode [ 1278.840804][T32605] device sit0 left promiscuous mode [ 1278.896817][T32604] device pim6reg1 entered promiscuous mode [ 1278.941394][T32612] device veth0_vlan left promiscuous mode [ 1278.963154][T32612] device veth0_vlan entered promiscuous mode [ 1278.999588][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1279.010606][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1279.020683][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1279.066900][T32623] syz.6.18524[32623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1279.066961][T32623] syz.6.18524[32623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1279.327720][T32635] device pim6reg1 entered promiscuous mode [ 1279.434879][T32637] ±ÿ: renamed from team_slave_1 [ 1279.779031][T32662] device pim6reg1 entered promiscuous mode [ 1280.812818][T32707] device pim6reg1 entered promiscuous mode [ 1280.995069][T32742] device wg2 left promiscuous mode [ 1281.154119][T32749] device wg2 entered promiscuous mode [ 1281.897704][ T331] ÿÿÿÿÿÿ: renamed from vlan1 [ 1282.080935][ T363] device wg2 left promiscuous mode [ 1282.123662][ T363] device wg2 entered promiscuous mode [ 1282.224456][ T369] device pim6reg1 entered promiscuous mode [ 1282.875730][ T410] device wg2 left promiscuous mode [ 1282.980549][ T424] device wg2 entered promiscuous mode [ 1284.074860][ T476] device veth0_vlan left promiscuous mode [ 1284.081445][ T476] device veth0_vlan entered promiscuous mode [ 1284.101282][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1284.110948][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1284.136944][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1284.169830][ T495] device wg2 entered promiscuous mode [ 1284.320976][ T507] device syzkaller0 entered promiscuous mode [ 1285.136248][ T548] device pim6reg1 entered promiscuous mode [ 1285.411339][ T556] device syzkaller0 entered promiscuous mode [ 1286.259870][ T592] tap0: tun_chr_ioctl cmd 1074025677 [ 1286.265763][ T592] tap0: linktype set to 769 [ 1286.600311][ T623] bridge0: port 2(bridge_slave_1) entered disabled state [ 1286.608561][ T623] bridge0: port 1(bridge_slave_0) entered disabled state [ 1286.641271][ T623] device bridge0 left promiscuous mode [ 1287.374325][ T689] device sit0 left promiscuous mode [ 1287.467905][ T690] device sit0 entered promiscuous mode [ 1288.079773][ T720] tap0: tun_chr_ioctl cmd 2147767519 [ 1288.133406][ T720] tap0: tun_chr_ioctl cmd 1074025677 [ 1288.138880][ T720] tap0: linktype set to 780 [ 1289.228136][ T785] device veth0_vlan left promiscuous mode [ 1289.245846][ T785] device veth0_vlan entered promiscuous mode [ 1290.204140][ T822] device syzkaller0 entered promiscuous mode [ 1292.274382][ T902] syz.3.18738[902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1292.274459][ T902] syz.3.18738[902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1292.356419][ T903] device veth0_vlan left promiscuous mode [ 1292.390891][ T903] device veth0_vlan entered promiscuous mode [ 1292.398503][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1292.409355][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1292.418029][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1292.559506][ T930] device syzkaller0 entered promiscuous mode [ 1292.775694][ T957] device wg2 entered promiscuous mode [ 1293.116199][ T989] device syzkaller0 entered promiscuous mode [ 1293.978051][ T1023] device wg2 left promiscuous mode [ 1294.005627][ T1023] device wg2 entered promiscuous mode [ 1294.545987][ T1056] : renamed from pim6reg1 [ 1294.789612][ T1072] device sit0 entered promiscuous mode [ 1295.037444][ T1070] device sit0 left promiscuous mode [ 1297.919745][ T1222] device syzkaller0 entered promiscuous mode [ 1298.925104][ T1245] syz.6.18835[1245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1298.925162][ T1245] syz.6.18835[1245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1299.067528][ T1252] tap0: tun_chr_ioctl cmd 2147767517 [ 1299.200672][ T1252] device pim6reg1 entered promiscuous mode [ 1299.663282][ T1288] device sit0 left promiscuous mode [ 1300.237262][ T1341] cgroup: fork rejected by pids controller in /syz5 [ 1300.648280][ T1376] device syzkaller0 entered promiscuous mode [ 1300.709254][ T1381] device syzkaller0 entered promiscuous mode [ 1300.756914][ T1378] device syzkaller0 entered promiscuous mode [ 1300.859692][ T1379] bridge0: port 1(bridge_slave_0) entered blocking state [ 1300.869880][ T1379] bridge0: port 1(bridge_slave_0) entered disabled state [ 1300.878212][ T1379] device bridge_slave_0 entered promiscuous mode [ 1300.889187][ T1379] bridge0: port 2(bridge_slave_1) entered blocking state [ 1300.900750][ T1379] bridge0: port 2(bridge_slave_1) entered disabled state [ 1300.911450][ T1379] device bridge_slave_1 entered promiscuous mode [ 1301.058013][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1301.068145][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1301.093553][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1301.108447][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1301.123360][ T443] bridge0: port 1(bridge_slave_0) entered blocking state [ 1301.130431][ T443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1301.147612][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1301.169046][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1301.186131][ T443] bridge0: port 2(bridge_slave_1) entered blocking state [ 1301.193203][ T443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1301.220151][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1301.239348][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1301.257262][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1301.271102][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1301.294636][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1301.302661][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1301.316768][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1301.328927][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1301.351308][ T1379] device veth0_vlan entered promiscuous mode [ 1301.359280][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1301.366877][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1301.382649][ T1379] device veth1_macvtap entered promiscuous mode [ 1301.399175][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1301.438664][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1301.447717][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1301.464589][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1301.473821][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1301.659807][ T1432] : port 1(erspan0) entered blocking state [ 1301.673466][ T1432] : port 1(erspan0) entered disabled state [ 1301.745060][ T1432] device erspan0 entered promiscuous mode [ 1301.984304][T25618] device bridge_slave_1 left promiscuous mode [ 1301.990575][T25618] bridge0: port 2(bridge_slave_1) entered disabled state [ 1302.028313][T25618] device bridge_slave_0 left promiscuous mode [ 1302.036452][T25618] bridge0: port 1(bridge_slave_0) entered disabled state [ 1302.045163][T25618] device veth1_macvtap left promiscuous mode [ 1302.245817][ T1510] device wg2 left promiscuous mode [ 1302.246201][ T1512] syz.0.18907[1512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1302.251840][ T1512] syz.0.18907[1512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1302.297672][ T1515] device syzkaller0 entered promiscuous mode [ 1303.452111][ T1535] device syzkaller0 entered promiscuous mode [ 1304.598869][ T1594] device syzkaller0 entered promiscuous mode [ 1304.784278][ T1631] device pim6reg1 entered promiscuous mode [ 1305.748623][ T1687] device wg2 left promiscuous mode [ 1305.781086][ T1687] device wg2 entered promiscuous mode [ 1306.460599][ T1752] device syzkaller0 entered promiscuous mode [ 1306.712844][ T1770] device veth0_vlan left promiscuous mode [ 1306.751743][ T1770] device veth0_vlan entered promiscuous mode [ 1306.834878][ T1784] device sit0 entered promiscuous mode [ 1307.071795][ T1805] syz.0.18991[1805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1307.071857][ T1805] syz.0.18991[1805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1307.244942][ T1809] device syzkaller0 entered promiscuous mode [ 1310.370349][ T1868] syz.0.19005[1868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1310.370417][ T1868] syz.0.19005[1868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1310.416972][ T1865] device sit0 entered promiscuous mode [ 1310.790092][ T1922] device syzkaller0 left promiscuous mode [ 1310.838662][ T1928] device veth0_vlan left promiscuous mode [ 1310.848444][ T1928] device veth0_vlan entered promiscuous mode [ 1310.867175][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1310.891375][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1310.907031][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1312.344470][ T2033] device syzkaller0 entered promiscuous mode [ 1312.353012][ T2040] device syzkaller0 entered promiscuous mode [ 1312.362765][ T2042] device pim6reg1 entered promiscuous mode [ 1312.825395][ T2033] device pim6reg1 entered promiscuous mode [ 1313.142422][ T2077] device pim6reg1 entered promiscuous mode [ 1313.411865][ T2091] device veth0_vlan left promiscuous mode [ 1313.449557][ T2091] device veth0_vlan entered promiscuous mode [ 1313.498303][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1313.522402][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1313.542053][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1315.774600][ T2132] device pim6reg1 entered promiscuous mode [ 1315.936337][ T2138] syz.2.19084[2138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1315.936436][ T2138] syz.2.19084[2138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1316.240502][ T2172] device wg2 entered promiscuous mode [ 1316.625575][ T2188] device sit0 entered promiscuous mode [ 1316.708223][ T2189] : port 1(erspan0) entered blocking state [ 1316.717455][ T2189] : port 1(erspan0) entered disabled state [ 1316.724738][ T2189] device erspan0 entered promiscuous mode [ 1318.264202][ T2280] device pim6reg1 entered promiscuous mode [ 1318.541154][ T2303] device sit0 left promiscuous mode [ 1318.577268][ T2303] device sit0 entered promiscuous mode [ 1319.446747][ T2320] device wg2 left promiscuous mode [ 1319.501393][ T2320] device wg2 entered promiscuous mode [ 1319.692071][ T2331] device syzkaller0 entered promiscuous mode [ 1320.686155][ T2443] device wg2 left promiscuous mode [ 1320.752353][ T2443] device wg2 entered promiscuous mode [ 1320.787112][ T2451] device pim6reg1 entered promiscuous mode [ 1321.275101][ T2508] device sit0 left promiscuous mode [ 1321.395661][ T2510] device sit0 entered promiscuous mode [ 1322.364248][ T2563] syz.6.19192[2563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1322.364341][ T2563] syz.6.19192[2563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1323.328908][ T2630] device sit0 left promiscuous mode [ 1323.454844][ T2636] device sit0 entered promiscuous mode [ 1323.694855][ T2659] device pim6reg1 entered promiscuous mode [ 1324.231286][ T2689] device veth0_vlan left promiscuous mode [ 1324.237436][ T2689] device veth0_vlan entered promiscuous mode [ 1324.254971][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1324.267714][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1324.301385][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1324.438255][ T2704] device syzkaller0 entered promiscuous mode [ 1325.734635][ T2778] device sit0 entered promiscuous mode [ 1325.751234][ T2780] device syzkaller0 entered promiscuous mode [ 1325.759617][ T2789] device pim6reg1 entered promiscuous mode [ 1326.658393][ T2849] device veth0_vlan left promiscuous mode [ 1326.665738][ T2849] device veth0_vlan entered promiscuous mode [ 1326.685066][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1326.703841][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1326.745719][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1326.862514][ T2853] device pim6reg1 entered promiscuous mode [ 1327.484986][ T2910] device syzkaller0 entered promiscuous mode [ 1329.516098][ T3018] bridge0: port 2(bridge_slave_1) entered disabled state [ 1329.524624][ T3018] bridge0: port 1(bridge_slave_0) entered disabled state [ 1330.938169][ T3170] syz.0.19368[3170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1330.938260][ T3170] syz.0.19368[3170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1331.121037][ T3185] device pim6reg1 entered promiscuous mode [ 1332.054952][ T3252] device sit0 left promiscuous mode [ 1333.031156][ T3298] device sit0 left promiscuous mode [ 1333.106280][ T3301] device wg2 left promiscuous mode [ 1333.177495][ T3310] device wg2 entered promiscuous mode [ 1333.239018][ T3325] syz.0.19408[3325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1333.239111][ T3325] syz.0.19408[3325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1333.257035][ T3321] device wg2 left promiscuous mode [ 1333.989576][ T3358] device bridge_slave_1 left promiscuous mode [ 1334.000438][ T3358] bridge0: port 2(bridge_slave_1) entered disabled state [ 1334.021528][ T3358] device bridge_slave_0 left promiscuous mode [ 1334.033962][ T3358] bridge0: port 1(bridge_slave_0) entered disabled state [ 1334.369282][ T3384] device veth0_vlan left promiscuous mode [ 1334.402859][ T3384] device veth0_vlan entered promiscuous mode [ 1334.716402][ T3402] device bridge_slave_1 left promiscuous mode [ 1334.724181][ T3402] bridge0: port 2(bridge_slave_1) entered disabled state [ 1334.740180][ T3402] device bridge_slave_0 left promiscuous mode [ 1334.747648][ T3402] bridge0: port 1(bridge_slave_0) entered disabled state [ 1335.269197][ T3387] device syzkaller0 entered promiscuous mode [ 1335.278932][ T3404] device sit0 left promiscuous mode [ 1336.288689][ T3497] device syzkaller0 entered promiscuous mode [ 1336.600011][ T3522] device pim6reg1 entered promiscuous mode [ 1336.679580][ T3507] device veth0_vlan left promiscuous mode [ 1336.700660][ T3507] device veth0_vlan entered promiscuous mode [ 1336.745777][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1336.755407][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1336.763117][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1336.966855][ T3584] syz.2.19480[3584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1336.966946][ T3584] syz.2.19480[3584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1336.996898][ T3584] syz.2.19480[3584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1337.011417][ T3584] syz.2.19480[3584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1339.583636][ T3704] device pim6reg1 entered promiscuous mode [ 1339.830144][ T3716] bridge0: port 1(bridge_slave_0) entered blocking state [ 1339.849813][ T3716] bridge0: port 1(bridge_slave_0) entered disabled state [ 1339.883613][ T3716] device bridge_slave_0 entered promiscuous mode [ 1339.898478][ T3735] device macsec0 entered promiscuous mode [ 1339.925109][ T3716] bridge0: port 2(bridge_slave_1) entered blocking state [ 1339.932444][ T3716] bridge0: port 2(bridge_slave_1) entered disabled state [ 1339.962880][ T3716] device bridge_slave_1 entered promiscuous mode [ 1340.018045][ T3748] syz.5.19530[3748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1340.018103][ T3748] syz.5.19530[3748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1340.137849][ T3716] bridge0: port 2(bridge_slave_1) entered blocking state [ 1340.156319][ T3716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1340.272440][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1340.283989][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1340.300396][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1340.317448][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1340.333581][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1340.350628][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 1340.357918][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1340.390778][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1340.403599][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 1340.410784][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1340.474479][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1340.499241][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1340.579900][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1340.599762][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1340.626357][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1340.641979][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1340.660075][ T3716] device veth0_vlan entered promiscuous mode [ 1340.698282][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1340.719146][ T3716] device veth1_macvtap entered promiscuous mode [ 1340.757381][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1340.780892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1340.868059][ T3799] device syzkaller0 entered promiscuous mode [ 1340.876179][ T3801] syz.5.19545[3801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1340.876257][ T3801] syz.5.19545[3801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1341.115661][ T3817] syz.5.19549[3817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1341.156434][ T443] device erspan0 left promiscuous mode [ 1341.179177][ T3817] syz.5.19549[3817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1341.201738][ T443] : port 1(erspan0) entered disabled state [ 1341.506225][ T443] device veth1_macvtap left promiscuous mode [ 1341.762951][ T3838] device wg2 left promiscuous mode [ 1341.884192][ T3838] device wg2 entered promiscuous mode [ 1342.410394][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1342.527664][ T3891] device syzkaller0 entered promiscuous mode [ 1342.543422][ T3888] device pim6reg1 entered promiscuous mode [ 1342.632349][ T3909] device sit0 left promiscuous mode [ 1345.445601][ T4009] device pim6reg1 entered promiscuous mode [ 1345.779119][ T4040] syz.5.19611[4040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1345.779169][ T4040] syz.5.19611[4040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1347.284255][ T4158] device sit0 left promiscuous mode [ 1347.405862][ T4161] device sit0 entered promiscuous mode [ 1347.875665][ T4188] device pim6reg1 entered promiscuous mode [ 1347.910734][ T4194] device pim6reg1 entered promiscuous mode [ 1347.999244][ T4196] device sit0 entered promiscuous mode [ 1349.010623][ T4250] device syzkaller0 entered promiscuous mode [ 1349.059096][ T4278] syz.6.19675[4278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1349.508804][ T4319] syz.0.19691[4319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1349.543398][ T4319] syz.0.19691[4319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1350.115218][ T4340] device wg2 left promiscuous mode [ 1350.199794][ T4345] device wg2 entered promiscuous mode [ 1350.496146][ T4360] device syzkaller0 left promiscuous mode [ 1350.640086][ T4390] GPL: port 1(erspan0) entered blocking state [ 1350.669526][ T4390] GPL: port 1(erspan0) entered disabled state [ 1350.701483][ T4390] device erspan0 entered promiscuous mode [ 1350.738897][ T4391] GPL: port 1(erspan0) entered blocking state [ 1350.745103][ T4391] GPL: port 1(erspan0) entered forwarding state [ 1350.929183][ T4400] device pim6reg1 entered promiscuous mode [ 1351.345248][ T4440] device wg2 entered promiscuous mode [ 1352.368882][ T4489] syz.3.19736[4489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1352.368943][ T4489] syz.3.19736[4489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1352.794300][ T4522] device sit0 left promiscuous mode [ 1352.854724][ T4522] device sit0 entered promiscuous mode [ 1353.695423][ T4562] device sit0 left promiscuous mode [ 1354.569627][ T4622] bridge0: port 2(bridge_slave_1) entered blocking state [ 1354.576735][ T4622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1354.584050][ T4622] bridge0: port 1(bridge_slave_0) entered blocking state [ 1354.591083][ T4622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1354.601459][ T4622] device bridge0 entered promiscuous mode [ 1354.705607][ T4617] device syzkaller0 entered promiscuous mode [ 1355.213365][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1355.246948][ T24] audit: type=1400 audit(1756776147.790:182): avc: denied { create } for pid=4654 comm="syz.0.19782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 1355.289991][ T4661] syz.0.19783[4661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1355.290079][ T4661] syz.0.19783[4661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1355.570295][ T4674] bridge0: port 2(bridge_slave_1) entered disabled state [ 1355.588964][ T4674] bridge0: port 1(bridge_slave_0) entered disabled state [ 1355.597525][ T4674] device bridge0 left promiscuous mode [ 1355.612181][ T4674] device bridge_slave_1 left promiscuous mode [ 1355.618502][ T4674] bridge0: port 2(bridge_slave_1) entered disabled state [ 1355.627105][ T4674] device bridge_slave_0 left promiscuous mode [ 1355.633430][ T4674] bridge0: port 1(bridge_slave_0) entered disabled state [ 1355.739884][ T4680] device syzkaller0 entered promiscuous mode [ 1355.753019][ T4684] device wg2 entered promiscuous mode [ 1356.000955][ T4694] device syzkaller0 entered promiscuous mode [ 1356.439731][ T4744] device syzkaller0 entered promiscuous mode [ 1356.531672][ T4767] syz.5.19821[4767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1356.531730][ T4767] syz.5.19821[4767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1356.778144][ T4785] device veth0_vlan left promiscuous mode [ 1356.882766][ T4785] device veth0_vlan entered promiscuous mode [ 1356.913364][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1356.931008][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1356.963606][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1357.135165][ T4796] device pim6reg1 entered promiscuous mode [ 1357.422097][ T4826] device wg2 entered promiscuous mode [ 1357.644865][ T4852] device wg2 left promiscuous mode [ 1358.034129][ T4895] device syzkaller0 entered promiscuous mode [ 1358.294834][ T4902] ÿÿÿÿÿÿ: renamed from vlan1 [ 1359.642849][ T5027] device sit0 entered promiscuous mode [ 1360.068931][ T5051] device syzkaller0 entered promiscuous mode [ 1360.204721][ T5068] device sit0 entered promiscuous mode [ 1360.673967][ T5113] ÿ: renamed from team_slave_1 [ 1360.802982][ T5138] device wg2 entered promiscuous mode [ 1360.847529][ T5138] syz.3.19930[5138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1360.848583][ T5138] syz.3.19930[5138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1362.467693][ T5225] device wg2 left promiscuous mode [ 1362.503181][ T5226] device veth1_to_team entered promiscuous mode [ 1362.512413][ T5227] device wg2 entered promiscuous mode [ 1362.579416][ T5234] device wg2 left promiscuous mode [ 1362.918088][ T5268] device syzkaller0 entered promiscuous mode [ 1363.118374][ T5274] device syzkaller0 left promiscuous mode [ 1363.880754][ T5336] device pim6reg1 entered promiscuous mode [ 1363.892895][ T5336] device wg2 entered promiscuous mode [ 1365.775597][ T5425] device veth0_vlan left promiscuous mode [ 1365.781689][ T5425] device veth0_vlan entered promiscuous mode [ 1365.800532][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1365.819197][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1365.844561][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1366.068391][ T5463] device veth0_vlan left promiscuous mode [ 1366.098808][ T5463] device veth0_vlan entered promiscuous mode [ 1366.176855][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1366.189871][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1366.208876][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1366.242519][ T5484] device pim6reg1 entered promiscuous mode [ 1366.869276][ T5533] device sit0 left promiscuous mode [ 1367.383438][ T5572] device syzkaller0 entered promiscuous mode [ 1367.501237][ T5586] device pim6reg1 entered promiscuous mode [ 1367.816901][ T5616] device pim6reg1 entered promiscuous mode [ 1369.939634][ T5753] device sit0 entered promiscuous mode [ 1370.517268][ T5773] device pim6reg1 entered promiscuous mode [ 1370.793701][ T5783] device wg2 left promiscuous mode [ 1371.249915][ T5809] device syzkaller0 entered promiscuous mode [ 1380.766425][ T5871] device wg2 left promiscuous mode [ 1380.842127][ T5875] device sit0 entered promiscuous mode [ 1381.177561][ T5903] device wg2 left promiscuous mode [ 1381.251155][ T5903] device wg2 entered promiscuous mode [ 1381.283103][ T5901] bridge0: port 1(bridge_slave_0) entered blocking state [ 1381.363538][ T5901] bridge0: port 1(bridge_slave_0) entered disabled state [ 1381.370916][ T5901] device bridge_slave_0 entered promiscuous mode [ 1381.443703][ T5901] bridge0: port 2(bridge_slave_1) entered blocking state [ 1381.455319][ T5901] bridge0: port 2(bridge_slave_1) entered disabled state [ 1381.463360][ T5901] device bridge_slave_1 entered promiscuous mode [ 1381.701311][ T5924] device syzkaller0 entered promiscuous mode [ 1381.721294][ T5901] bridge0: port 2(bridge_slave_1) entered blocking state [ 1381.728391][ T5901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1381.735691][ T5901] bridge0: port 1(bridge_slave_0) entered blocking state [ 1381.742715][ T5901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1381.864257][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1381.872162][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1381.881074][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1381.936776][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1381.973520][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1381.980599][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1381.988370][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1382.012559][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 1382.019647][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1382.054827][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1382.067857][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1382.140040][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1382.162136][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1382.188238][ T5901] device veth0_vlan entered promiscuous mode [ 1382.207959][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1382.220802][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1382.244680][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1382.252363][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1382.300358][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1382.315172][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1382.328992][ T5901] device veth1_macvtap entered promiscuous mode [ 1382.629148][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1382.637319][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1382.654834][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1382.744131][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1382.782999][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1383.130637][ T443] device erspan0 left promiscuous mode [ 1383.138368][ T443] : port 1(erspan0) entered disabled state [ 1383.998951][ T443] device bridge_slave_1 left promiscuous mode [ 1384.005419][ T443] bridge0: port 2(bridge_slave_1) entered disabled state [ 1384.013046][ T443] device bridge_slave_0 left promiscuous mode [ 1384.019360][ T443] bridge0: port 1(bridge_slave_0) entered disabled state [ 1384.044247][ T443] device veth0_vlan left promiscuous mode [ 1384.507755][ T6027] ip6erspan0: tun_chr_ioctl cmd 1074025677 [ 1384.517593][ T6027] ip6erspan0: linktype set to 805 [ 1385.921933][ T6099] device syzkaller0 entered promiscuous mode [ 1386.223971][ T6137] device wg2 left promiscuous mode [ 1386.457741][ T6154] device syzkaller0 entered promiscuous mode [ 1396.477987][ T6169] device syzkaller0 entered promiscuous mode [ 1397.568047][ T6246] device syzkaller0 entered promiscuous mode [ 1398.023321][ T6297] device veth1_macvtap entered promiscuous mode [ 1398.047835][ T6297] device macsec0 entered promiscuous mode [ 1398.085054][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1398.629505][ T6334] device veth1_macvtap left promiscuous mode [ 1398.652296][ T6334] device macsec0 left promiscuous mode [ 1398.712576][ T6333] device veth1_macvtap entered promiscuous mode [ 1398.769446][ T6333] device macsec0 entered promiscuous mode [ 1399.404995][ T6381] device sit0 left promiscuous mode [ 1399.516454][ T6382] device sit0 entered promiscuous mode [ 1400.282121][ T6437] device syzkaller0 entered promiscuous mode [ 1400.314064][ T6458] device dummy0 entered promiscuous mode [ 1401.387679][ T6543] syz.6.20335[6543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1401.387794][ T6543] syz.6.20335[6543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1401.441325][ T6551] device veth0_vlan left promiscuous mode [ 1401.458905][ T6551] device veth0_vlan entered promiscuous mode [ 1401.473977][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1401.484082][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1401.491510][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1401.852930][ T6593] device syzkaller0 entered promiscuous mode [ 1403.502783][ T6710] device syzkaller0 entered promiscuous mode [ 1404.229921][ T6755] syz.5.20397[6755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1404.229975][ T6755] syz.5.20397[6755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1404.559091][ T6778] device pim6reg1 entered promiscuous mode [ 1404.639206][ T6781] device wg2 entered promiscuous mode [ 1404.752449][ T6789] device sit0 left promiscuous mode [ 1405.100331][ T6785] device sit0 entered promiscuous mode [ 1405.142736][ T6808] device wg2 entered promiscuous mode [ 1405.199193][ T6825] device sit0 entered promiscuous mode [ 1405.358246][ T6832] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1405.365797][ T6832] syzkaller0: linktype set to 804 [ 1406.155585][ T6920] syz.5.20446[6920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1406.155682][ T6920] syz.5.20446[6920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1406.348140][ T6934] device pim6reg1 entered promiscuous mode [ 1406.806120][ T6975] device sit0 left promiscuous mode [ 1407.210384][ T6991] device syzkaller0 entered promiscuous mode [ 1407.487085][ T7019] device wg2 entered promiscuous mode [ 1408.174785][ T7057] device wg2 left promiscuous mode [ 1408.269806][ T7063] device veth1_to_team entered promiscuous mode [ 1408.322668][ T7057] device wg2 entered promiscuous mode [ 1408.563350][ T7082] device pim6reg1 entered promiscuous mode [ 1408.798851][ T7084] device syzkaller0 entered promiscuous mode [ 1408.814234][ T7093] device veth1_macvtap left promiscuous mode [ 1408.820682][ T7093] device macsec0 entered promiscuous mode [ 1409.162697][ T7127] device sit0 left promiscuous mode [ 1409.582084][ T7171] device pim6reg1 entered promiscuous mode [ 1409.768390][ T7187] device sit0 left promiscuous mode [ 1410.299608][ T7226] device sit0 entered promiscuous mode [ 1410.379405][ T7239] syz.3.20541[7239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1410.379542][ T7239] syz.3.20541[7239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1411.105866][ T7306] device syzkaller0 entered promiscuous mode [ 1411.130665][ T7304] device wg2 left promiscuous mode [ 1411.339327][ T7322] device veth0_vlan left promiscuous mode [ 1411.359530][ T7322] device veth0_vlan entered promiscuous mode [ 1411.408551][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1411.418229][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1411.431381][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1411.661133][ T7362] device veth0_vlan left promiscuous mode [ 1411.707634][ T7362] device veth0_vlan entered promiscuous mode [ 1411.755501][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1411.764173][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1411.772138][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 1412.577557][ T7477] device wg2 left promiscuous mode [ 1412.613874][ T7477] device wg2 entered promiscuous mode [ 1412.691519][ T7488] tun0: tun_chr_ioctl cmd 1074025676 [ 1412.703271][ T7488] tun0: owner set to 0 [ 1412.841912][ T7486] bridge0: port 1(bridge_slave_0) entered blocking state [ 1412.897765][ T7486] bridge0: port 1(bridge_slave_0) entered disabled state [ 1412.938888][ T7486] device bridge_slave_0 entered promiscuous mode [ 1412.956247][ T7486] bridge0: port 2(bridge_slave_1) entered blocking state [ 1412.973270][ T7486] bridge0: port 2(bridge_slave_1) entered disabled state [ 1412.993714][ T7486] device bridge_slave_1 entered promiscuous mode [ 1413.028200][ T7510] device wg2 left promiscuous mode [ 1413.040894][ T7510] device wg2 entered promiscuous mode [ 1413.315038][ T7542] device sit0 left promiscuous mode [ 1413.657976][ T7548] device wg2 left promiscuous mode [ 1413.766131][ T7548] device wg2 entered promiscuous mode [ 1413.804687][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1413.814415][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1413.831366][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1413.864440][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1413.872944][ T443] bridge0: port 1(bridge_slave_0) entered blocking state [ 1413.880018][ T443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1413.888679][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1413.912351][ T7571] syz.0.20634[7571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1413.912435][ T7571] syz.0.20634[7571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1413.929824][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1413.950159][ T443] bridge0: port 2(bridge_slave_1) entered blocking state [ 1413.957230][ T443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1414.050357][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1414.059252][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1414.066924][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1414.075296][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1414.083722][ T7579] device sit0 left promiscuous mode [ 1414.100566][ T7486] device veth0_vlan entered promiscuous mode [ 1414.178071][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1414.186614][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1414.194334][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1414.211430][ T7486] device veth1_macvtap entered promiscuous mode [ 1414.232618][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1414.241778][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1414.250707][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1414.288546][ T7581] device syzkaller0 entered promiscuous mode [ 1414.302197][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1414.315159][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1414.347448][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1414.357597][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1414.929721][ T7] device veth1_macvtap left promiscuous mode [ 1414.963767][ T7] device veth0_vlan left promiscuous mode [ 1415.362493][ T7620] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1415.371541][ T7620] syzkaller0: linktype set to 804 [ 1415.398507][ T7628] device syzkaller0 entered promiscuous mode [ 1415.807876][ T7674] -1: renamed from syzkaller0 [ 1417.370349][ T7791] device sit0 entered promiscuous mode [ 1418.113836][ T7845] syz.3.20713[7845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1418.113926][ T7845] syz.3.20713[7845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1419.148819][ T7869] syz.0.20718[7869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1419.211242][ T7869] syz.0.20718[7869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1420.441483][ T7944] device veth0_vlan left promiscuous mode [ 1420.554558][ T7944] device veth0_vlan entered promiscuous mode [ 1420.615243][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1420.644012][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1420.706275][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1422.404126][ T8037] device sit0 entered promiscuous mode [ 1423.340223][ T8119] syz.6.20790[8119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1423.340284][ T8119] syz.6.20790[8119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1424.815361][ T8235] syz.5.20824[8235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1424.827024][ T8235] syz.5.20824[8235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1426.099467][ T8262] device sit0 left promiscuous mode [ 1426.222784][ T8281] syz.6.20839[8281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1426.222871][ T8281] syz.6.20839[8281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1426.284214][ T8284] syz.0.20838[8284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1426.312074][ T8284] syz.0.20838[8284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1427.203577][ T8344] device veth0_vlan left promiscuous mode [ 1427.254248][ T8344] device veth0_vlan entered promiscuous mode [ 1427.263799][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1427.295012][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1427.333680][ T443] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1428.829919][ T8469] device macsec0 left promiscuous mode [ 1428.920132][ T8482] bridge0: port 1(bridge_slave_0) entered disabled state [ 1428.943047][ T8481] device veth0_vlan left promiscuous mode [ 1428.956756][ T8481] device veth0_vlan entered promiscuous mode [ 1431.595120][ T8671] device wg2 left promiscuous mode [ 1431.658842][ T8671] device wg2 entered promiscuous mode [ 1431.745186][ T8688] device sit0 entered promiscuous mode [ 1431.797151][ T8686] device veth0_vlan left promiscuous mode [ 1431.817998][ T8686] device veth0_vlan entered promiscuous mode [ 1431.896112][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1431.905515][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1431.918986][T25618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1433.795611][ T7] GPL: port 1(erspan0) entered disabled state [ 1433.817458][ T7] device erspan0 left promiscuous mode [ 1433.822973][ T7] GPL: port 1(erspan0) entered disabled state [ 1434.204915][ T7] device bridge_slave_1 left promiscuous mode [ 1434.211622][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1434.219149][ T7] device bridge_slave_0 left promiscuous mode [ 1434.225348][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1434.233120][ T7] device veth0_vlan left promiscuous mode [ 1436.927178][ T8981] device sit0 entered promiscuous mode [ 1438.010961][ T9001] device veth1_macvtap left promiscuous mode [ 1438.045085][ T9001] device macsec0 entered promiscuous mode [ 1438.133951][ T9010] veth0_vlan: mtu greater than device maximum [ 1442.197000][ T9108] device wg2 left promiscuous mode [ 1442.245554][ T9108] device wg2 entered promiscuous mode [ 1442.287892][ T9116] device sit0 entered promiscuous mode [ 1444.015478][ T9148] syz.0.21084[9148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1445.535083][ T9173] syz.3.21090[9173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1457.636370][ T9367] device sit0 left promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=6 req=20962 state=3 status=67 (errno 9: Bad file descriptor) [ 1457.703283][ T24] audit: type=1400 audit(1756776250.240:183): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[14379]" dev="pipefs" ino=14379 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 1459.503987][ T307] device bridge_slave_1 left promiscuous mode [ 1459.510144][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 1459.517672][ T307] device bridge_slave_0 left promiscuous mode [ 1459.523948][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 1459.531781][ T307] device bridge_slave_1 left promiscuous mode [ 1459.538046][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 1459.546073][ T307] device bridge_slave_0 left promiscuous mode [ 1459.552183][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 1459.560318][ T307] device bridge_slave_1 left promiscuous mode [ 1459.566629][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 1459.574100][ T307] device bridge_slave_0 left promiscuous mode [ 1459.580235][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 1459.588523][ T307] device veth1_macvtap left promiscuous mode [ 1459.594559][ T307] device veth0_vlan left promiscuous mode [ 1459.600396][ T307] device veth0_vlan left promiscuous mode [ 1459.606424][ T307] device veth0_vlan left promiscuous mode [ 1459.612308][ T307] device veth1_macvtap left promiscuous mode [ 1459.618494][ T307] device veth0_vlan left promiscuous mode