last executing test programs: 26.757744397s ago: executing program 3 (id=2670): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) socketpair(0x10, 0x0, 0x14, &(0x7f00000001c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000850000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_exit\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1a, 0x4, 0x6, 0x1, 0x14, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x80dc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x3, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x2141, 0x9, 0x0, 0x5, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 23.225474707s ago: executing program 3 (id=2670): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) socketpair(0x10, 0x0, 0x14, &(0x7f00000001c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000850000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_exit\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1a, 0x4, 0x6, 0x1, 0x14, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x80dc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x3, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x2141, 0x9, 0x0, 0x5, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 18.419003973s ago: executing program 3 (id=2670): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) socketpair(0x10, 0x0, 0x14, &(0x7f00000001c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000850000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_exit\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1a, 0x4, 0x6, 0x1, 0x14, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x80dc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x3, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x2141, 0x9, 0x0, 0x5, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 15.972404912s ago: executing program 2 (id=3058): perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0xff, 0x10c20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x8000000000000001}, 0x100000, 0x800, 0x0, 0x6, 0x0, 0x7, 0x1000, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0xff, 0x10c20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x8000000000000001}, 0x100000, 0x800, 0x0, 0x6, 0x0, 0x7, 0x1000, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x3, {{0x1, 0x1}}}, 0x10, 0x0}, 0x20000044) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/net\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x9a, 0x1, 0x0, 0x0, 0x0, 0x2, 0x22300, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000280), 0xc}, 0x14400, 0x1, 0xbb4, 0x6, 0x4, 0x0, 0x0, 0x0, 0x6cead20d, 0x0, 0x8}, 0x0, 0x800000000000004, 0xffffffffffffffff, 0x0) openat$cgroup_int(r3, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000eeffffff000000000000000000ab26fca57707500da195527606ec7300"/43], 0x34) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071123f000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[], 0x34) (async) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[], 0x34) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) (async) openat$cgroup_ro(r5, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) 15.703569337s ago: executing program 2 (id=3067): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x8000, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000007c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000100)=0x50) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) socketpair$unix(0x2f, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x11, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000faf7ffff00000000000000008500000007000000b7080000000000007b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000000000085000000a500000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={@ifindex, 0x2e, 0x0, 0x2, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@fallback=r7, r2, 0x5, 0x0, 0x0, @void, @value, @void, @void, r8}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 15.0699176s ago: executing program 3 (id=2670): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) socketpair(0x10, 0x0, 0x14, &(0x7f00000001c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000850000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_exit\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1a, 0x4, 0x6, 0x1, 0x14, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x80dc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x3, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x2141, 0x9, 0x0, 0x5, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 13.408497933s ago: executing program 2 (id=3076): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@func={0x2, 0x0, 0x0, 0xc, 0x2}, @func_proto]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x34}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000002000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x1}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000001200)=[{}], 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRESHEX=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x3, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x2141, 0x9, 0x0, 0x5, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 13.321373844s ago: executing program 2 (id=3080): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00'}, 0x18) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x9, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@call={0x85, 0x0, 0x0, 0x83}, @call={0x85, 0x0, 0x0, 0xba}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x1, 0x1, 0x8, 0x4, 0x9}, @exit]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f}, 0x94) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r4}, 0x8) sendmsg$tipc(r5, &(0x7f0000000340)={&(0x7f0000000140)=@id={0x1e, 0x3, 0x3, {0x4e21}}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000180)="8a6ce543af0df8f66337a887c88c0fde1f4d3010582dedca18dbcf1b6a0b35d2df28a21d3977808ec503d92b02ab24e5eec8ae4a9f7debdcbfb33c59066577a5b53932a3a730a278d831730dfc1deef6344f9560fae492da1b9081053afd76f277ab2b398cdbdb523150372eb03b0df32d638aa9dfce81eef4914b65fe46ff22d32f28dadbd91afc6ca2d29e06a50520d235", 0x92}], 0x1, &(0x7f0000000280)="b856e60ba41c63fa4cb093188277dfe6da8746cee7b88e3c0813735b58b7b5fe8bdfc67bb1da1e669bb46f231f6ffb2aa424b4655f8eb2de6ebc199c451adafb9ff31f95ce0864dd6a65e938cc3d0eb36917e3fd7ffd9a9e29274891bcb5f010e528f5163d417cfe0726c3d4a7192283540698303f113914df2d7434aa951dfd27b7a30663c1660f26a64a", 0x8b, 0x4080}, 0x90) 13.281198636s ago: executing program 3 (id=2670): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) socketpair(0x10, 0x0, 0x14, &(0x7f00000001c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000850000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_exit\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1a, 0x4, 0x6, 0x1, 0x14, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x80dc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x3, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x2141, 0x9, 0x0, 0x5, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 13.221517837s ago: executing program 32 (id=2670): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) socketpair(0x10, 0x0, 0x14, &(0x7f00000001c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000850000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_exit\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1a, 0x4, 0x6, 0x1, 0x14, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x80dc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x3, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x2141, 0x9, 0x0, 0x5, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 13.218638917s ago: executing program 2 (id=3082): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xac, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0xa505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x8}, 0x0, 0x4, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x64d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007b00000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080", @ANYBLOB], 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'netpci0\x00', 0x1000}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 13.093658559s ago: executing program 33 (id=3082): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xac, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0xa505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x8}, 0x0, 0x4, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x64d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007b00000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080", @ANYBLOB], 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'netpci0\x00', 0x1000}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 13.089035719s ago: executing program 34 (id=3083): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) r2 = getpid() syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/cgroup\x00') (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000ffff000000007200ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r3}, 0x10) (async) r4 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, r4, 0x4, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd637f4b22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa10000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000007f000000ffffffff00000100", @ANYRES32, @ANYBLOB=':\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04e9ff00030000000100000000f10df3000000f4000000000000001fa6aded", @ANYRES32, @ANYBLOB], 0x50) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 12.927242722s ago: executing program 35 (id=3081): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007b00000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x10, 0x3, 0x9, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), 0x9, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r6, 0x0, 0x1}, 0x18) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000a40)=ANY=[@ANYRES64=r7, @ANYRESDEC=r8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000900), &(0x7f0000000980)='%pK \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r10, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100000002001500000000000000983ba525de2ed8759c3b"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200f0ff28533f546a781b00000080000004000000000000000000", @ANYRES32=r4, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000000000000100"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xb, 0x3, &(0x7f0000000000)=@raw=[@generic={0x2, 0x0, 0x2, 0x6, 0x101}, @generic={0xff, 0xe, 0x3, 0x0, 0xb}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0xd3, &(0x7f0000000340)=""/211, 0x40f00, 0x2, '\x00', r11, @fallback=0x17, r12, 0x8, &(0x7f0000000540)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0xe, 0x3, 0x38}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000800)=[r13, 0x1, 0xffffffffffffffff, r14, r15], 0x0, 0x10, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0xa2}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) socketpair(0x15, 0x5, 0xfefb, &(0x7f0000000a00)) 12.885044174s ago: executing program 6 (id=3091): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000a30500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0400000004000000040000000000010008080000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00"/28], 0x48) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2a}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, &(0x7f00000002c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000009e01000005"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x2000009a, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r8, 0x702, 0x86, 0x0, &(0x7f0000000580)="e460334470d8d400eb00c15286dd4b3547f2cbfad47001bd34d04351caf1f9a07be047c25d7670ea4a41b8a6800c0de87b6f8e6a725643f7b3ab502617b472091a730e36aabb2f2426a24a29edbed9463081eef61aa7fab052ffcc89b4bac5bae255a31da7c7b87aca6e0a240ce57daf09b305e2cd418404d54cdca435ab392d48aa01019845", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r9}, 0x10) close(r0) syz_clone(0x9001000, &(0x7f00000007c0)="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", 0x106, &(0x7f0000000180), &(0x7f0000000780), &(0x7f0000000900)="7b50714c3646fd5d09f4ef790b872cae3048dafef4cada39e03ff2fb4b5044496cc6b1ffe74a4d9eb512df88c59b861fc98fa176a92029f4eac3740742f5979350c879aa9df35092b94f2c6a8209e2946068555b97fca6eba9e2f721c896069b029893ff533770a16cae02b5fc4ac70132585d00889b58c5a9592e13b036b14e7891c302") bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf17}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 12.784639615s ago: executing program 36 (id=3091): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000a30500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0400000004000000040000000000010008080000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00"/28], 0x48) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2a}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, &(0x7f00000002c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000009e01000005"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x2000009a, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r8, 0x702, 0x86, 0x0, &(0x7f0000000580)="e460334470d8d400eb00c15286dd4b3547f2cbfad47001bd34d04351caf1f9a07be047c25d7670ea4a41b8a6800c0de87b6f8e6a725643f7b3ab502617b472091a730e36aabb2f2426a24a29edbed9463081eef61aa7fab052ffcc89b4bac5bae255a31da7c7b87aca6e0a240ce57daf09b305e2cd418404d54cdca435ab392d48aa01019845", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r9}, 0x10) close(r0) syz_clone(0x9001000, &(0x7f00000007c0)="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", 0x106, &(0x7f0000000180), &(0x7f0000000780), &(0x7f0000000900)="7b50714c3646fd5d09f4ef790b872cae3048dafef4cada39e03ff2fb4b5044496cc6b1ffe74a4d9eb512df88c59b861fc98fa176a92029f4eac3740742f5979350c879aa9df35092b94f2c6a8209e2946068555b97fca6eba9e2f721c896069b029893ff533770a16cae02b5fc4ac70132585d00889b58c5a9592e13b036b14e7891c302") bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf17}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 12.776774775s ago: executing program 8 (id=3085): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000033c0)=ANY=[], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x73, &(0x7f0000000400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xf9, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x3, &(0x7f00000002c0)=@raw=[@map_idx_val={0x18, 0x4, 0x6, 0x0, 0x5}, @alu={0x4, 0x1, 0x3, 0x2, 0x7, 0x0, 0x8}], &(0x7f0000000300)='GPL\x00', 0x5, 0x1000, &(0x7f0000001340)=""/4096, 0x41000, 0x58, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000740)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0xa, 0xbb1, 0x80000001}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f00000007c0)=[{0x5, 0x3, 0xa, 0x7}, {0x0, 0x1, 0xe, 0x1}], 0x10, 0x401}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000008500000018000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r5}, 0x10) socketpair(0x3, 0xa, 0x0, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 12.701910027s ago: executing program 37 (id=3085): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000033c0)=ANY=[], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x73, &(0x7f0000000400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xf9, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x3, &(0x7f00000002c0)=@raw=[@map_idx_val={0x18, 0x4, 0x6, 0x0, 0x5}, @alu={0x4, 0x1, 0x3, 0x2, 0x7, 0x0, 0x8}], &(0x7f0000000300)='GPL\x00', 0x5, 0x1000, &(0x7f0000001340)=""/4096, 0x41000, 0x58, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000740)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0xa, 0xbb1, 0x80000001}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f00000007c0)=[{0x5, 0x3, 0xa, 0x7}, {0x0, 0x1, 0xe, 0x1}], 0x10, 0x401}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000008500000018000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r5}, 0x10) socketpair(0x3, 0xa, 0x0, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 12.699391797s ago: executing program 7 (id=3084): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x800}, 0x100001, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x5, r2}, 0x38) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0xb, &(0x7f00000000c0)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x73}}]}, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x4, &(0x7f0000000c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0xba}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000fcffffff000000000100000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000700008500000006000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r8}, 0x10) 12.698442277s ago: executing program 38 (id=3084): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x800}, 0x100001, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x5, r2}, 0x38) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0xb, &(0x7f00000000c0)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x73}}]}, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x4, &(0x7f0000000c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0xba}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000fcffffff000000000100000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000700008500000006000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r8}, 0x10) 12.686023757s ago: executing program 9 (id=3086): socketpair$tipc(0x1e, 0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="05000000050000000004000009"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001000000", @ANYRES32], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) 12.56969471s ago: executing program 39 (id=3086): socketpair$tipc(0x1e, 0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="05000000050000000004000009"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001000000", @ANYRES32], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) 12.52861841s ago: executing program 2 (id=3088): bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@bloom_filter={0x1e, 0x1, 0x2, 0x7, 0x240, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xf}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300), 0x8) gettid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000feffffff0000000003000000850000004100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f805ffffb702000008000006b70300000300000085000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2c, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x8000, 0x1c}, 0xc) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="3e1d0090fbb04f895c2ade85e3000400000004002c67e439576c53f3ef8b47fb3750036bf976b7e40ec19a0d0e2c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7000000}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x20, &(0x7f0000000080)={&(0x7f0000000480)=""/239, 0xef, 0x0, &(0x7f0000000000)=""/124, 0x7c}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb01001800000000000000b8000000b800000004000000100000000000000904000000070000000a000085000000000c00000000000000090000000700000005000000193300000800000001000000ff0300000c0000000400000081da00a86e1cb4000300000006000000090000000500000001000000060000000200000000ff7f00000d00000004000000020000000f00000001000000b396000000000000000000030000000004000007000000000500000008000000000000110500000001000000005f5f00"/212], &(0x7f0000000780)=""/152, 0xd4, 0x98, 0x0, 0xfffffffe}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@bloom_filter={0x1e, 0x8, 0x8, 0x7, 0x0, r0, 0xfffffff7, '\x00', 0x0, r6, 0x1, 0x4, 0x2, 0x5}, 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454c9, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x800, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) 12.479838711s ago: executing program 40 (id=3088): bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@o_path={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@bloom_filter={0x1e, 0x1, 0x2, 0x7, 0x240, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xf}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300), 0x8) gettid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000feffffff0000000003000000850000004100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f805ffffb702000008000006b70300000300000085000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2c, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x8000, 0x1c}, 0xc) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="3e1d0090fbb04f895c2ade85e3000400000004002c67e439576c53f3ef8b47fb3750036bf976b7e40ec19a0d0e2c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7000000}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x20, &(0x7f0000000080)={&(0x7f0000000480)=""/239, 0xef, 0x0, &(0x7f0000000000)=""/124, 0x7c}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb01001800000000000000b8000000b800000004000000100000000000000904000000070000000a000085000000000c00000000000000090000000700000005000000193300000800000001000000ff0300000c0000000400000081da00a86e1cb4000300000006000000090000000500000001000000060000000200000000ff7f00000d00000004000000020000000f00000001000000b396000000000000000000030000000004000007000000000500000008000000000000110500000001000000005f5f00"/212], &(0x7f0000000780)=""/152, 0xd4, 0x98, 0x0, 0xfffffffe}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@bloom_filter={0x1e, 0x8, 0x8, 0x7, 0x0, r0, 0xfffffff7, '\x00', 0x0, r6, 0x1, 0x4, 0x2, 0x5}, 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454c9, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x800, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) 11.224474846s ago: executing program 0 (id=3101): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) close(0xffffffffffffffff) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x3, 0x0, 0x100}]}) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xffffffffffffff8c, &(0x7f0000001000)=ANY=[@ANYRESOCT=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x240000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xb, &(0x7f0000001040)=ANY=[@ANYRESOCT=r0, @ANYRES32=r2], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 10.690468287s ago: executing program 1 (id=3105): r0 = syz_clone(0x200, 0x0, 0xfffffffffffffea4, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r4}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x40, 0x4, 0x3f, 0x6, 0x0, 0x473a, 0x10001, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x6, @perf_config_ext={0x6}, 0x10, 0xa, 0x6, 0x6, 0xffffffffffffffff, 0xf0, 0x3ff, 0x0, 0x9, 0x0, 0xffffffffffff0001}, r0, 0xffffffffffffffff, r3, 0x1) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0xe) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="12000000290000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r7}, &(0x7f0000000040), &(0x7f0000000140)=r6}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r7, &(0x7f00000001c0), 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0xe, 0x0, &(0x7f0000000340)="0000000000000010cf7b24ff8906", 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 7.231962836s ago: executing program 1 (id=3106): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x0, 0x1e, &(0x7f0000000180)=[{}, {}], 0x10, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x8a, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x20, &(0x7f0000000580)={&(0x7f0000000480)=""/22, 0x16, 0x0, &(0x7f00000004c0)=""/183, 0xb7}}, 0x10) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x3}, 0x50) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)=@o_path={&(0x7f0000000680)='./file0\x00', 0x0, 0x4020}, 0x18) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4008}, 0x18) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2}, 0x50) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xe, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x34, 0xf, &(0x7f0000000080)=""/15, 0x40f00, 0x40, '\x00', r0, @fallback=0x7, r2, 0x8, &(0x7f0000000400)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x8, 0x7, 0x101}, 0x10, r3, 0xffffffffffffffff, 0x4, &(0x7f0000000880)=[r4, r5, r6, r7, r8], &(0x7f00000008c0)=[{0x5, 0x2, 0xa, 0x2}, {0x2, 0x4, 0x10, 0xc}, {0x3, 0x2, 0x3, 0xb}, {0x5, 0x3, 0x8, 0xb}], 0x10, 0x1}, 0x94) r10 = bpf$ITER_CREATE(0x21, &(0x7f00000009c0), 0x8) r11 = getpid() r12 = perf_event_open(&(0x7f0000000b00)={0x4, 0x80, 0x40, 0x2, 0xf8, 0xeb, 0x0, 0x8, 0x820, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000ac0), 0x3}, 0x53, 0x8, 0x4, 0x2, 0x9, 0x6, 0x6, 0x0, 0x7fffffff, 0x0, 0x10001}, 0xffffffffffffffff, 0xb, r10, 0x0) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0xf, 0x3, 0x5, 0x25, 0x0, 0x3, 0x100, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000a00), 0x2}, 0x1000, 0x0, 0x5a0, 0x5, 0x7f, 0x10000, 0x7, 0x0, 0x2, 0x0, 0x8000000000000001}, r11, 0xa, r12, 0x9) sendmsg$tipc(r10, &(0x7f0000001f00)={&(0x7f0000000b80)=@name={0x1e, 0x2, 0x2, {{0x2}, 0x2}}, 0x10, &(0x7f0000001e00)=[{&(0x7f0000000bc0)="edd35a9424167bde9c8d17b869b08365be35b593327380568df775c352f437127f132abe6ca6cc65c16810388cff85c61ff64676cd4ef8496b30af22714671fb29f8178d40a40f33105fd5a220afb3bfb09bf809ed4efb7dda8f7b75c6beea805a23266056d26362a560f7915daaac30de32fbfb75d9bb3ebf2d71d6d3fe4ed26d3911fc3ac43face92f6c55b145039f5217531317e703732cde2263c88fa23bd496a38f993c57d1be3eddc7a6de7e245656ab8d9f04df50943e3f88", 0xbc}, {&(0x7f0000000c80)="7fc2692a093156d783af3af8ef7d1039dc5bc88bbbbcd92ad0d8a0e71f0cfc28148029864722", 0x26}, {&(0x7f0000000cc0)="b074a0421160076b24a70ad4bbf4d8c682b151203584cf9237b7acdedc26319caef2baf867e5356548b6fd683491f021ce525928ee8c153740a15fe77958fe44e1c7041eb1c15d95b87cd9cd383b5e04360bf773a2936a70e869790bbce1b5a629091f1546b7a754e4077dc908ed2121aabd67654ad930de770367a8a39fa2e1e702cbabaf88a14d6c6f86d2b6dc8e42ef9847368be9c65f957e8f510413b11038f8447a993ff122c389239b1396a76fb140c0734c0f737f9638437612f6e71bcc69c8605b85f35ae9c276d64ac86ef194a041a55b6e0ff5126703062314032ea1c78cef2bafaa0216a31aedd455abe3566bea73c87cab6774a2b5801cff11e8ee105e545cde035af429b1dc564eb0471f17d9e4929ec578bc651cd00689bd24167e3551d9219470731757fa335d656256d7b6b6f1283e95fac81d3aebe9e60e139785d0faaf3b9928f6ea141bb2a6557bb7ba9f4a53bc6f0936e1866dfd89e8055ce2c8f049fdb0ea8989a47bf46f1c38eefcb5c0177494283e9ba2e083ccbdaec175d115cd3eef132c96991b23f52fd85dc61d9fe79a2061972ef279834250aaffd0d43610afe556dbf55c9ffc5c1c41e81ab6c10b3a1b1bda16633f23cab8ce87e2e022ffcf241b8f4231c40e73c1aa47de8e1e45064e7d0f23cca9ae2a14528b329f4f089eed270d6279dfdf52c25c139d60ed7a81173b289f54b114019513c3c09cb9cb1bfd7fc7b6cc6720733ec7107326e4fe1ad8f098b94b19ae206f86fdde80c211c21cce67f2bcd5e5d9516255061085ffa056d99d2189510be1159d4ec633c72b059a5e8584d91315b9beaffab691cc23c4bbc2ae3d0d9362c656c91cfacbff51bee117140b9c7a45c40c99567c174dbfdc3468966765cbac901d0ff2e6649bf67cbc4b25a6d034d0a49a0f08ea635e2b057f91731410f21967d6f6dd7c78dffc7c529c3a64672ed788785ca2727367a081984ecfe7b13d55a3862660fd616d69601e2298a41e516044747536ed2dba53de46278237e5d066ef5bc475f28d16bf9373bd04e2daa938f019ac9ac2bd881667346bb65e678c91f08bbaa08e379fdf9d44a05fc3b3ea5983b3d5d3360dac2c4bb236c33dc8c34e3b3fa78f70cfacd759039a666e0413889fb40fc8a23aeed206d483d26e16d0d8147b19ef4431bf2f02b6faf38bf6defdee388087c18eb07293793c1405a1d925fea7ce0e4f1370d07db8e4748b945c43aae66da3018c6ac4ca7a4633e412253769db8acfa85638e130504cbf909ac2310ee6f4c6a9d88cd98c7685685f91b91adfb83295d8e4139ac42d757c8830c3986fe38eb07cc6cb9b6c86897ec0d264b7c08dd43f6a63bc64506b21d87462a5ac71db742216be78e1fe885cbe3b84a21d1df336eb0803faf943f273be1c5308c596c8b88b939275b0dff40aebf75b5deb899b187d6ef8ce38fcbe106012fe63e8ae3173d5565042d9fab81fb7c302d6b411523ab8b4590c7b50664279f402d73710e687851e8f14b325d713be3318b23d9cf1404267f2428dbf2de2e54b4df6239a708eb64f32ac40473ede9a483d0adf9202fb41237b5acc701241f2e16cc14c63c5b8423533118aa86d509dbfa5427cb230e34c23c49e2de099e239efb9f8ff89cc3090df2d56d8380aed6e48e2a6a346ab34bbf970039173eafc094273a772d88fb2e927a507d75586dcb3891b9389ef39ff887c7c188a7d839a941b3b1729c35ae45156b8239999b802893d400e35c981ce5b86b1b5f59e49ae038e6f5546b82dfc214f662e0078d46588cf0e6d709c8ca53403738ff1037c2f6f532533e563e63d8bf0d5984fd04b8df7124f53066fd4927037c4b9a2f81d50c3d514621b29878928e56fadebc278e8795ec469c692d55b7a13354ea826e3dbf598dc50a357498b02ffef09aac22be3404dd8dfe6ae55101cedee124985e89da24d32968e9268d6324ed0a7a57fa6d57fbba4bbfd8c0a552911e10a6a8e43d3bfa1d22de231c2f985871296a402646b504fc0910c7aa2bb75c29e5d588e33fe796426df94dbc733f64aaae3960bb0ff01ab1b99a51aa79d01fc977684903afa6847e65e3d705cdc0015e641e205c3b77fa7417281044e298ca88e9a53e9e678932400711d1cbe477833128b416c23b20e94488934feeac3d5056301f32dee50edb992a7dd532a3d22fbcf0efb788cfaf041b7ddf3733825a8efad3ae9baf223025ab7fcc5e2e3f6a92fafa6b72a55db8b487732800e6072912be068f0dd363705cd6789ff8f4b61ef0c88e62e9d31ced251f5c8d93e70c7f9fbce280568d38cf63fb0c18d18212a676c30c80c01a49f60a423e7a8e1cd208a8c5b4bf80bc120c98192dbcce3139074b826953041a10107d75410cad372046078c9a055d2e449b79e45e32c7d08590ba86edfa4966dcd46b66e057197d7085772a47653a84ca2e06d6d68fc6bd3ead2350e211ef2e0d7ba0e8a63116e53a900c4b313227be7fca7399f40fc4d35de09bafe66d35ed754c075caa4b7c9517a41e937a4ff2c682df4823cbb62c3b1d3ea7a0d3b567a0aa1da084c1c961652b2b99e135a8b7f1320162b59e1a14d578a7b601246d4a2bc7b614269edc647b13f7c5ae4a54401d9586afb9dbeeaae0a81c2f85ae0e1c543be06133bd7268c348065629c7ae9aacca022f884db2bbf7cfbb7cf931df850f6cb9f4693b73061ab92622b26d2c12a52687575073e112f6af506f939460d71f43b7e8deb586ea13f8ea3a906cebb131d9799e328f767135f75045081746281b625968f7d2c91818e2547fabab8648d340f1b794dfd98d96d0a57271949f5fa7ecb5e85286af407c1fcfcb44078af61c5a0798c3b6c94d368d830125a581586e7384c67cbacba9e09aba0a81757f5065c50b9e6545e807ffd48c4ebcccdb0af2b69d9101be1d50a60b3d081f192cb907473e9c0678a8cf3f353c7a0dff65f4f3692c8579edae6ef77e43209fa6630ba1a4f9f61b38609848e29728fe5261168b3e7edb284d2bdd471df8726f94d0ecf15317799bb182b50ca577c347197f275a5bce1d9d5774e64e524ea650a7dd8ea74f82556425999145754c111d1ddfd1605deb1eda7874d71a2fb21e6622a2443a8f908e617eae8ba022f9b2c8f346bece2f0e88fab0136d7db5970d27886dc360eac6447500a45b3acf59277c2c7b9082d95b43f60f5de66faf796b3731255b61a474df060f44e089735b5224970ba5163cc77cd9d064007d7c851fab2b02af9d09ed6914bf729c3f715540f87bcee63d4a20728ecc5f5588754ba69612076fc520cd74678184da9f432e8dea30f84ac682e81742378f9df9cf4177ab30172474bdecc67979a281bcd809f3170cdc4070fdac569056b4f5afed013a934e5527996a86a296de6956fa85b5a946150c81971f039c4b5522f7d0283f5908ffd160696bbe83abb76c5a6ef6085fdacde1f9465d53b8e4408a04b53d4afa6b716ded66f70d94eac923557f265f37bc743ef6702af0d44be3d771c3a679237a678df388d04e86d6ad7c1b2d3932804f071d7d301adf3f8ff806cf0450e21b84984f10c70a20abb7d7225485b00f1d0fa808349f199d53849cf968e963bdebcf10583d8e8fcb0a0c5051aa07cdc19d26e1532e11e672e54bedd78b7e93f0f0ec8eb492272ef1c5525859f6262df7cd3b2571af4c8b091ffb16d1f0ea6f0e6285652714a4ce2bbbde0b84c61b8cd0672d3c987597f98469713513931c76e28b78865d42157c9c119c786ea4da2c3bbdf77e4947ee36fb8850b43f0f62278dc4b272de03c8c5bb0a14f424523d0ca24d586ef4d4d985e128615a1653c8b22698064dc9939e40436ef154d8d2f75c56494ccc87f92be5c235d216a66a7377a8bedc9d61205987a49c85ce98d4173b69c04ce99ee85f56fdebde5b93ca6d7bef83281c85b4bcc260435519894c4440720f396469af7ea2290b242cbe3c7447de753fa1ec42c42fa80ec22318999be31686ef15df166c8d18c5ca2fbddf5f9ecae91594a4b408e83ae7e5f039025ad7bb6d2d682f376b7262e7d4b04eb9a5af992efe5080d353c15a0f2f40075b7445b12309811a4d417c4af59c321bf242a09c7b923fdc358f85629918e3c1531471b7eaf7476c8a8c35ff1addfbdde72a15c2c1dffede1e78abab6319d58ede4290a567f5bacd9496b0ecfd41a4821e217e845d8d7f836992b65c5aa213dbd33bc2b53d94d28e4a913a96e3c5a65a88bff886f987a1e42163a28869144b6d90f02920fec3d91ef84f5d23efe1a8c6790c569462c01e59f8440ddaa9933aa602b075dbca511a05dc12107b5483df2e4e798f3add70a751d0a67c4703c447823d62c38f9af96e986c6dc4f3e3e2a9a4ec40150680ee6d0957f6ab03ff73463aeb08822f19e02311d4ced817badffcbf4d633ce34ff56c78e6419c2e2acef704c479a4cc98c706951ffcf114eeac18b8e0cf3231803351ce98cd1c864755eddc13b0043dc35ce55dfe2bf26aae86e07f4fe70562a469abe993b97e0b417337e2040511e30df741ae2aa971bba679ebd6793d51033add2ccf6262b27ccb08c66aadaaf1e5b18a15f52b63171fcd9fc5a6f84a2e5e2dc3f214a3c72d4c336c244b24b4fbb67e67d0e9d2585f2ae91d434adfb87dfdd361a1ece7ce0a5748e405faf385be93fcd1b4e3338e25364bf3b99e7ec4d71dd2082aad942c657f6cb96cb2159adfd887a9f8907db668a2192a6ab1f5a50b825c285a9ef1f4125189b28b8dbc27a9e5437a8d4568bee496e24b0700a866f805572675e7ce973f2b6cd46948f39dd53c2cb46f1bf7986a9742477d23890c4829fc4ab359594fa50fe711b4b254d3d5b9109612783b25e5e2406713cd3ba28afd436801a966d656da50aecff2ca179262900c88e355062c55dff1b1e197b39e40e16e782501fc0380dae671474acefe840ccbf77a10eebdb8090d14c8ad4e377d77e1665b74a0d5a038b15118bb6a02094575208ca0e9b6482a2f3a0b754a87bd967d45ff527df3c244beac219d606de5f39e2f4673a8baf7a8ed66242c720a0c216c652e85e9da8fd85fdf8cca417a14b2a496654edeb349451303e5621e11c960399e29f4104ed1b664980ba22ed5fa46254742ee4f2802432278f49a02bc1ca561d4759966898e3a1cf119c12e32b266613c4209ef1293af4bf2a7c282d8b2bcc4063fb263df7e6b89d9aa965c8bd3136ae31fc71e3388f290b690f269da66977daf6a6ed639d55586a20ed5bdd194ed7679e6684eee11ba4d5e0d5606fae267fc757f34e1344714c6f6866b3c703717f7f398220310e22cf3af62067cf07ec75e9a90373d64f50df6e93888a17c0ada6d4f5477671b84371920a0ffb0dca672f15ec4361ee4f7bb52114e10972d85a4e82b70a8d4399a3c3085255efe7398b3206d91a9361576006f4813cf1e57cb96375180819d09a81f9df6c7d6e89fa7d8a4c93a2c6c2af6a5796e38aa5dd4902131136072534b27ef09af67b4102cb96bf8123f10e8a660e6592d7c7a48a6a8ee5a550803ceacc581e3bb6fdea83c04ca811ed06e6f6e7f4d0bfe0842925b605cb55473f62b15f898d63bdf5f91dee80b6e09d503d97fbd4b7e1e62b89c5f2dd124c30819437d1c106c975a65cdc328cb536e488da76a5af62386519b3b431796d7187d07af88769e91fa7f82b3567c81cb415cd7c70307f3e1a5f435ec360104d9c6c5b62d1fa56c11b414eb039ecf62dc06b63ade416c22f71bfab892236ca2fbe4a3da5274b4f96d43a8f1bed", 0x1000}, {&(0x7f0000001cc0)="d1d3d6cac550480bd77dfe45d727064ba9a8e7056fe2e732527e552069bcfad0c92c631574d325970b6b221d8f1e51d09217a13e2a45515ef84d373221b7b0d77307", 0x42}, {&(0x7f0000001d40)}, {&(0x7f0000001d80)="b2b4cd8220610479b3e95d7cbe04f4e4c7d49ee8454c8154378daf1de4e8525517075a158cceeb950e65daf21b8a38250f16026546bbb99eadf589434fccc5d20d1ddfe259c151d52b0e8142bdbb2efb472a87574a8f48fb59a5c7ea2d1a73901765888a8802999f", 0x68}], 0x6, &(0x7f0000001e80)="04b0996e8db58e463edffeb9d06cad0d71df3f0683c80dc1e9679d764db086b1b5ff598ba72986e0042cd8eb43425abe002753c1e1089c2bca87c45ecc27ef518f00ba980f46201b3848b59286b19950ea9998bffe3bed571f5e006e7b53f307d9e8208201f8e5cd4cc39ceff4ad1cbd55bfc156c5da096de0", 0x79, 0x4040000}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002100)={0x6, 0x8, &(0x7f0000001f40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_val={0x18, 0x3, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x9}, @alu={0x2ed60ec695bf4a0b, 0x0, 0x7, 0xb, 0x0, 0xfffffffffffffffc, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000001f80)='GPL\x00', 0x400, 0xc0, &(0x7f0000001fc0)=""/192, 0x41100, 0x3, '\x00', r0, 0x25, r8, 0x8, &(0x7f0000002080)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000020c0)={0x2, 0x9, 0x6, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5c}, 0x94) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000021c0)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', r0, r10, 0x5, 0x0, 0x4}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002480)={r10, 0x58, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r15 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002540)={&(0x7f00000024c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@func={0x9, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x61, 0x30, 0x5f, 0x3e, 0x2e, 0x2e]}}, &(0x7f0000002500)=""/41, 0x2c, 0x29, 0x1, 0x10000, 0x10000, @value=r10}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002640)=@bpf_lsm={0x1d, 0x20, &(0x7f0000002240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@generic={0x2, 0x3, 0x7, 0x7, 0x8}, @exit, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x81}}, @map_val={0x18, 0x8, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x400}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @map_val={0x18, 0x6, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0x8}, @ldst={0x2, 0x3, 0x4, 0xa, 0xa, 0x100, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002340)='GPL\x00', 0x5, 0x48, &(0x7f0000002380)=""/72, 0x5a5d879614630477, 0x5, '\x00', r14, 0x1b, r15, 0x8, &(0x7f0000002580)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000025c0)={0x3, 0x4, 0x9, 0x4c0}, 0x10, r1, 0x0, 0x2, 0x0, &(0x7f0000002600)=[{0x0, 0x4, 0xf, 0xb}, {0x3, 0x2, 0x2, 0x7}], 0x10, 0x2}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002780)={{r6}, &(0x7f0000002700), &(0x7f0000002740)=r9}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000002800)=@generic={&(0x7f00000027c0)='./file0\x00'}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002840)={r5}, 0x4) r16 = openat$cgroup_ro(r10, &(0x7f0000002880)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002a00)={r5, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002ac0)={0x6, 0xe, &(0x7f00000028c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffc}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x80000000}, @call={0x85, 0x0, 0x0, 0xb3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r16}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000002940)='GPL\x00', 0x400, 0xe, &(0x7f0000002980)=""/14, 0x40f00, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000029c0)={0x3, 0x10, 0x80000001, 0x6}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000002a40)=[r4, r13, r5, 0xffffffffffffffff, r17], &(0x7f0000002a80)=[{0x4, 0x2, 0x3, 0x9}, {0x3, 0x5, 0x8}, {0x5, 0x5, 0x10}], 0x10, 0x2}, 0x94) ioctl$TUNGETDEVNETNS(r10, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002bc0)={r11, r10, 0x0, 0x2, &(0x7f0000002b80)=']\x00'}, 0x30) ioctl$TUNGETVNETHDRSZ(r10, 0x800454d7, &(0x7f0000002c00)) r18 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002c40)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x3f7, '\x00', 0x0, r15, 0x5, 0x1, 0x4}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000003000)={0x3, 0x4, 0x4, 0xa, 0x0, r18, 0x14b, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3}, 0x50) 7.03143089s ago: executing program 1 (id=3107): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="000000000000000000040000000000000000cc00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000f9000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x91, 0x91, 0x6, [@var={0xf, 0x0, 0x0, 0xe, 0x4, 0x1}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x19, 0x0, 0x4c, 0x1}, @datasec={0xc, 0x4, 0x0, 0xf, 0x3, [{0x3, 0x1}, {0x2, 0x9, 0x7}, {0x3, 0x3, 0x5}, {0x5, 0x0, 0x9}], "eb4185"}, @datasec={0x10, 0x2, 0x0, 0xf, 0x2, [{0x2, 0x5, 0x7f091ff0}, {0x1, 0xfffffffc}], "d2d3"}, @volatile={0x3, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x30, 0x30, 0x0, 0x0]}}, &(0x7f00000001c0), 0xb2, 0x0, 0x1}, 0x28) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) 6.834784244s ago: executing program 0 (id=3108): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000004400000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000140000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000a00)=""/4096, 0x1000}], 0x1}, 0x10121) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth0_to_team\x00', 0x400}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @int={0x1, 0x0, 0x0, 0x1, 0x5, 0x1, 0x0, 0x0, 0x4}]}}, 0x0, 0x42}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000100000000000001e5ff0000200700000000000001000084060000000000000001"], 0x0, 0x42}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000fc0)='sched_switch\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 6.659397477s ago: executing program 1 (id=3109): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r0}, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc1, 0xc1, 0x9, [@datasec={0x6, 0x7, 0x0, 0xf, 0x1, [{0x4, 0x5, 0x10001}, {0x1, 0x6, 0x9}, {0x2, 0x1, 0x8}, {0x4, 0x6, 0x3}, {0x5, 0x6f, 0x4}, {0x1, 0xdc, 0xc6}, {0x4, 0x5, 0xeec8}], "e0"}, @struct={0x2, 0x6, 0x0, 0x4, 0x1, 0xe, [{0x7, 0x5, 0x3}, {0xf, 0x2, 0x6}, {0x7, 0x4, 0x80000000}, {0x0, 0x5, 0x11}, {0xb, 0x1, 0x93a0}, {0x1, 0x4, 0x1}]}, @float={0x5, 0x0, 0x0, 0x10, 0x4}]}, {0x0, [0x5f, 0x61, 0x0, 0x2e, 0xf2b9e36f8cc5ca84, 0x5f, 0x5f]}}, &(0x7f00000002c0)=""/19, 0xe5, 0x13, 0x0, 0x0, 0x10000}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r1, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x80100, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000001180)=ANY=[], 0x0, 0x0, 0x32, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000100)="71a9", 0x2}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000, 0x5f}, 0x1e) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x2f9, 0x4888, &(0x7f0000000040)="b9010360000df000009e0ff008001fffffe100004000638977fbac14140fe0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1}, 0x48) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x19, 0x4, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xbb}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0600000004000000990500000a"], 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00', r6}, 0x18) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000500)="d3ce4ab66fdbb7c877360ec33c836438e3621e2973a76aabce0748dccd30f3f7225edcaa630000000000000000000000004ae3199a3281994cb9bd9bc774effa6846360d6a016eaec108202d1b4ac27f55ab6fcaeb79546419b2fc75f6715d7bea2cd76b2c10717f98d520eb235b3a01e6587b99b229dd321b30883679289d1c8db549ad87e4edfc979caef456544266c8179c8f", &(0x7f0000000900), 0x404, r7, 0x4, 0x1ba8847c99}, 0x38) (async, rerun: 64) syz_clone(0x1080, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 6.283656255s ago: executing program 1 (id=3110): bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000", @ANYRES32=0x1, @ANYBLOB="00000000000000000000001c0000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="024000000500"/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x52, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000480)={&(0x7f0000000340)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/81, 0x51}, {&(0x7f0000000580)=""/143, 0x8f}], 0x2, &(0x7f0000000280)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}, 0x40000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r3}, 0x18) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={0x0, 0x91b1400079c52c93}, 0x105c34, 0x8000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 6.0306577s ago: executing program 5 (id=3111): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff7) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x18) getpid() ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000007000000ae34c98711994383e6219257cec31c4aa53be7f9273d0a5189ef212808ac8f8d2ae6cb5b7f6691ff4bd46512d88b2707164cd252e842ada1e0dab274b3f3296868be312efa622deb75c400"/108, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x3, 0x4, &(0x7f0000000d00)=ANY=[@ANYBLOB="18020000030000000000000000000000850000008700000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2d}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f00000003c0)="c274386d178550cb864bd57221bc", 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x894a, &(0x7f0000000500)='lo:\x96o8\x15d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x96\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xfc\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xf6\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000f60e000000020000000000000000000004750d00000000"], 0x0, 0x26}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x1, 0x10, 0x0, 0x301}, 0x90) 5.785419835s ago: executing program 0 (id=3112): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x3c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r3}, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1}, 0x50) r5 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r6, 0x2000012, 0x0, 0x0, 0x0, 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x50) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x2100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x102040, 0x0, 0x0, 0x4}, 0x0, 0x0, r7, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101400, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000001740)=ANY=[@ANYBLOB="9feb0100180000000000000030000000"], 0x0, 0x4d, 0x0, 0x3, 0x10000}, 0x28) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r4}, 0x38) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r9}, 0x18) close(r1) 5.784482395s ago: executing program 3 (id=3087): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000100)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xa, &(0x7f0000000000)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r0}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xff}}], &(0x7f0000000080)='GPL\x00', 0x101, 0x91, &(0x7f0000000100)=""/145, 0x41000, 0xdb764f65b81be38, '\x00', 0x0, @fallback=0x38, r1, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0xa}, 0x10, 0xffffffffffffffff, r3, 0x4, &(0x7f0000000240)=[r0], &(0x7f0000000280)=[{0x0, 0x4, 0x3, 0x9}, {0x5, 0x5, 0x8, 0xa}, {0x1, 0x3, 0x7, 0x3}, {0x1, 0x2, 0x7, 0xa}], 0x10, 0x10000, @value=r4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xf, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="1806000002000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300000000000285000000bb000000b700010000000000950000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.150013877s ago: executing program 5 (id=3113): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa1", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1f, 0xd, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x75}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x20000002}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0xa6}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x34}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r8 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r9}, &(0x7f0000000180), &(0x7f00000001c0)=r8}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) openat$tun(0xffffff9c, &(0x7f0000000040), 0x24100, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 2.059447739s ago: executing program 4 (id=3115): write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0xfffffd26) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x5}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x16, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="660a0000020000006111940000000000850000000200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) 2.00437161s ago: executing program 4 (id=3116): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x7, [@restrict={0xe, 0x0, 0x0, 0xb, 0x3}, @restrict={0x7, 0x0, 0x0, 0xb, 0x1}, @fwd={0xd}, @const={0xc, 0x0, 0x0, 0xa, 0x3}, @func={0xc, 0x0, 0x0, 0xc, 0x5}, @fwd={0xb}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0x48, 0x0, 0x40, 0x9}, @func={0x7, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x5f, 0x30, 0x5f, 0x30, 0x0]}}, &(0x7f00000003c0)=""/127, 0x83, 0x7f, 0x1, 0x5}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x1, 0x8001, 0x10200, r1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x2, 0xf}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x628040, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000500)={'hsr0\x00', @local}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xa3500, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r4}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.710100016s ago: executing program 5 (id=3117): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x89, &(0x7f0000000100)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0xb6, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='blkio.throttle.io_serviced\x00', 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000400)={r3, r1, 0x0, r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0xeffd, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.529426769s ago: executing program 4 (id=3118): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x10000, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x33) (rerun: 32) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async, rerun: 32) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='(pu\"\"&\t&&') recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)) (async) write$cgroup_subtree(r5, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63fc80fc020c2f00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa3a2008"], 0xfdef) (async) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x63, 0x2, 0x2, 0x4c, 0x0, 0x8, 0x0, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xf, 0x2, @perf_bp={&(0x7f0000000000), 0x11}, 0x2, 0x8, 0x9, 0x8, 0x7, 0x8, 0x3ff, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x4, r5, 0xa) ioctl$TUNSETLINK(r0, 0x400454cd, 0x6) 1.528391569s ago: executing program 0 (id=3119): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r2, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f00000006c0)=[0x0], &(0x7f0000000540)=[0x0, 0x0], 0x0, 0x2d5, 0x0, 0x0, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0xd2, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x6, 0xc, &(0x7f0000002d00)=ANY=[@ANYRES16=r1, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x29, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async, rerun: 64) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x1c, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x18f, 0x32, &(0x7f0000000040)=""/50, 0x41100, 0xead77aebb5b859b2, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x8, 0x5290, 0xa}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000001c0)=[r0], &(0x7f00000004c0)=[{0x1, 0x5, 0xc, 0x2}, {0x2, 0x5, 0x10, 0x9}, {0x4, 0x2, 0xc, 0x8}, {0x5, 0x2, 0x3, 0x8}, {0x3, 0x5, 0x4, 0x6}], 0x10, 0x1000}, 0x94) (async, rerun: 64) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa2721, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r11 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r12}, 0x10) r14 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r15 = syz_open_procfs$namespace(0x0, &(0x7f0000000b40)='ns/net\x00') (async, rerun: 64) r16 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r16, 0x5}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f0000000280), &(0x7f0000000700)}, 0x20) (async) r17 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r1}, 0x8) (async, rerun: 64) r18 = syz_clone(0x8005000, &(0x7f0000001080)="4a17aef44db2a84a69dbf647d75a2fe7dc614dc376874f6bb7e7e9ca59376254282b8e3c2df5ea2600b4e7291a8bc905e58ed12ab736dc16334cd9be776af6661a9885eb032e04ab4bfb434864abe31f4e590137f384e29ff46524feaf6542024c4849a0a888e1672fb1b4081fdc752a6223f146b5f9aa08c7b7a846fae1efaed87193209fbcb6cb9f0fdc17", 0x8c, &(0x7f0000000280), &(0x7f0000000340), &(0x7f0000001140)="0f0f149653b63af802dc2c8c9c64b6a829366863cfc428ac942a2ac5026ed6cb127958c3695fb08383cf29b5e92bb94ebb4cece8aeb40a6db1ed5365bd9c490ef3d90d1f2af9384b7f7933f3092b9e51a631168cfbd589be332cc5e9df39573c3ba6466bea665794fd44f87d43f0000228bc3e4c6c85334e75c96bf9b0b7d078afc5e58965cd51f2a320fa4aee32941956857a86d4539ca91e88096f136647d00e9d64d13df8b5aebf9e1fd02a36ad5a5755305f225dd8b1596556fb82181768d995d357e8feb817fb524d29581856e53b3599fd492a56bdb20ee097cabc7e4ce54840d2e5") (async, rerun: 64) r19 = perf_event_open(&(0x7f0000001240)={0x4, 0x80, 0xfb, 0x0, 0x5, 0x0, 0x0, 0x240b, 0x24, 0x5, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x348, 0x4, @perf_bp={&(0x7f0000000580), 0x5}, 0x1414, 0x20, 0x1000, 0x4, 0x5, 0x2, 0x4, 0x0, 0xfffffffd, 0x0, 0x8001}, 0xffffffffffffffff, 0x4, r1, 0x0) (async) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000012c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4}, 0x50) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000a80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000b80)="4ee68acd1d40d3850a568b5eb744c287f05bfa1ec5ff6c4aff85ab48e5e0a557e6518642326b199bd7236195c741c19538c2529bbd02c5c0664e8a3e534fcb97f66707dd0e0d25a861adb1a3f25540fa300669f0830e0cefa34fac104bd0511fd46a3311642ed166fc1272a6bcbd63d5dea6a6b89c774586e6e3c876342b5d6333c3ab3908fe2d70d35582365957ffeb18c3f13a54afe602614fba0f55a091d1da0498d0581d86d064619d92045eae75c9f69c7d141536b218f991106933aaaeb7373a852843239d6df1575ec716f8a837a3635bbcd44269570f22c865bcac832d11d664b0cc6db5d5d7621b7fb55e863c53c5", 0xf3}, {&(0x7f0000000c80)="744efa5553146b3f551d431d2427bba378e4654efcd2112b10943a9d51f0a3eba3fd7c3b4d75d8b44d6d3a9444d8da54e9d42b7cde84cf3851f866e456663be38f30e30fb38568f1bbd2d5", 0x4b}, {&(0x7f0000000d00)="0950e5f29377c25b749f720a0115349ff6a6c9228c1bcd1968a9ee359a50d7d9c3fb3429f152d377a74a33e8f36b9478e7317ae9325102f82940349b5562afc61e680a37d91648426287a63ba12822c2167e1c792f8e9b3caa5a93540dd123b4d3cf2a706fe4769697e0c227c26c5ba182e0bdfa6765579bdb7741b7fe39db379c8c55697a8521664c0fd215865d", 0x8e}, {&(0x7f0000000dc0)="bba827f49fe1b7a82651b58f8e5f49e973ed3485bc368ae8c3b1a9625130224265daf753dc9b0e8ed9afd6764f3a8ba7aabc15ef7ee846034172e78fa803fd7fc72a8f44213d268df52fe77abb8325b32b778358346564d5d1b79b1d8c36335a6eb783f5703f20b506a2765ab3b83bbe2631a48435ad4ffb4699c17d4de256f586deb6dfeb40eea899", 0x89}, {&(0x7f0000000e80)="8be252e0c92bd4781779855d2a31df90946f9dd92f4533af9d9bb8584ca219397aaec6e300cc520c94e7c93aead56c5ea8fd6dc9e429718564549c912e1e9ca3a90531d03b277d26e1318e92ea55c35a76c1a7c3e0bfcdc01cf5c167e9009791f67dbfcf5447ba0cda0b14593e4d1f5da4f177afe1133b4c42fc5592aa7306d83297389eb72b7c7d77d63b0fa8116a7981c9b4f8cf764e833fcc8b2a7a948baefa22883fc8363e59f16f9f6d3d4f79cd13cd4ea1de5dd40e818f517aaeef291fca2d2c41a36497809c7f053d869d668add1740faf595ce937bfdcb208155e4acf4f0e6ffc7238d5b588cbed5148ddfc9", 0xf0}, {&(0x7f0000000f80)="8632742cfad84a188e5063dcdea2759df96e6a4405dbbe521ab82ecd5d427b863d84c7a710c68d513aaa976c73d56d49f1c20471b08d226bf1a94508fd8fe0e9aa7231af62bf1950baf5bdab20863606", 0x50}], 0x6, &(0x7f0000001340)=[@rights={{0x38, 0x1, 0x1, [r13, r6, r13, r17, r13, r7, r6, 0xffffffffffffffff, r6, r6]}}, @cred={{0x1c, 0x1, 0x2, {r18, 0xee01}}}, @rights={{0x28, 0x1, 0x1, [r2, r6, r0, r11, r11, r9]}}, @rights={{0x24, 0x1, 0x1, [r0, r15, r15, r8, r10]}}, @rights={{0x20, 0x1, 0x1, [r14, r7, r19, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [r12, r4, r5, r8, r2, r20]}}], 0xf0, 0x8001}, 0x40) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r22) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) recvmsg$unix(r21, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.52779311s ago: executing program 4 (id=3120): bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x100000101, 0x7fffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3560, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3b200007"], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r9 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1c, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000002000000000000000800000018000000cc00000000000000010b00009500000000000000"], &(0x7f00000005c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x74, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x2, 0x1, 0x5, 0x3}, 0x10, 0xffffffffffffffff, r3, 0x3, &(0x7f00000006c0)=[r1, r0, r0, r9, r0, r0], &(0x7f0000000700)=[{0x5, 0x2, 0x8, 0x9}, {0x5, 0x1, 0xf, 0x7}, {0x0, 0x2, 0x7, 0x7}], 0x10, 0x9}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r0}, &(0x7f00000002c0), &(0x7f0000000800)=r10}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000a00)='fib_table_lookup\x00', r2}, 0x18) 1.49266766s ago: executing program 0 (id=3121): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a00000004000000fd0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="6e45530d8484493b0000000000000000c0ffffff00"/37], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x13, 0x8, &(0x7f00000009c0)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, 0x0, &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe800000000000"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='qi_submit\x00', r2, 0x0, 0x6}, 0x18) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) ioctl$TUNGETVNETLE(r5, 0x40047451, &(0x7f0000000180)) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x6, &(0x7f0000000340)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x400}, @call={0x85, 0x0, 0x0, 0xcb}, @alu={0x4, 0x1, 0x3, 0x2, 0x7, 0x18, 0xffffffffffffffff}, @exit], &(0x7f0000000540)='GPL\x00', 0x8, 0x3e, &(0x7f0000000580)=""/62, 0x41000, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x9, 0x401, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff]}, 0x94) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000740)=r6) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x40200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000), 0xfdef) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x200000000000) 1.409080822s ago: executing program 5 (id=3122): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x1f00, 0x18, 0x19, &(0x7f00000007c0)="9f44948721919580684010a40566", 0x0, 0x7ff, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39", &(0x7f0000000380)="8c5911c525f5cf4c4ecf207ad2ec", 0x0, 0x0, 0xffffffff}, 0x23) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xb0ffffff}, {{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a04, 0x0, @perf_bp={0x0}, 0x1e005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xfdef) 1.408165642s ago: executing program 4 (id=3123): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x323, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[], 0x50) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x1e, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240), 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES16=r1, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xd, 0x4, &(0x7f0000000400)=ANY=[@ANYRES8=r7, @ANYRES32=r8, @ANYRES16=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB="0100000004000000029600008500000001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)="a17abd7c18cf849b288a9ccf2f6cd01576a60e6a75d6095b906da81195ee210632ff5cdbe4df675c43a84cd27a40c1d374c2dd354d30bcd60c2a2b860f008238d717d6cf0b4e0ac29adfbbbc393abeb74c65354f62d57392aa528e867c9db4d77bb7f63d2527382860a9ec32c53b2899227748bff0ecff1146f532d9590edacac7b29ce6365c856765", &(0x7f0000000240), 0x800, r9}, 0x38) 1.256505055s ago: executing program 0 (id=3124): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340), 0x10}, 0x94) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="05000000070000000700000001"], 0x48) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000100000022bf000000000000", @ANYRES32, @ANYBLOB="000000000000e9ff0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x2000000, 0xd384ed8852b2f03d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r2, &(0x7f00000008c0)="c4b611e4dcaf3e7d7ceab3c3b615748b83fe83747d0d678f31a98660032fb3b401d83c3e0d8bdc424529d223bf22dd139b4c28882b2bbcec5be3dd06c31e9686ebd6f42dc67956116a364bb69f1cf84284868cbcd7dcb2aaf9683185280d693e8c66b9998e40a9c43a7163a1c6484b5d6a6664ead4186336051ed9754954da3088bf6655e224c1a6f47dcaa7853ead80894eb64918a1e4996c4a21b4c564e1c7237cb7b85df3d0af6ab36614bc1e933b62b43de4ea0eab79ad1d8360b609891a590818299a7699dd8392d0e7", &(0x7f00000003c0)=""/20}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x23) 413.181512ms ago: executing program 5 (id=3125): bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000200007b8af8ff00000015bfa200000000000007020000f8ffffffb703000008000000b70400000000000085100000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, 0x0, &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socketpair(0x3, 0xa, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x7, 0x4, 0x700, 0x700, 0x2c}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 386.031912ms ago: executing program 4 (id=3126): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f0000000dc0)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r3, &(0x7f0000002580)=ANY=[@ANYBLOB="1e0308003c5c980128876360864668f82ffdd569d2f630b5e033ff11edf1c5ffc733d2acb165fe588cd568cd1f31b87b68b028"], 0xffdd) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9c, &(0x7f0000000540)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x47, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000009c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xb, [@type_tag={0x3, 0x0, 0x0, 0x12, 0x2}, @struct={0xd, 0x1, 0x0, 0x4, 0x0, 0x9, [{0x6, 0x2, 0x3}]}]}, {0x0, [0x61, 0x5f, 0x2e, 0x5f, 0x2e, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000a40)=""/169, 0x47, 0xa9, 0x1, 0xfffffffc, 0x10000}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000cc0)={0xffffffffffffffff, 0x20, &(0x7f0000000c80)={&(0x7f0000000b00)=""/193, 0xc1, 0x0, &(0x7f0000000c00)=""/76, 0x4c}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x7, 0x34, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @exit, @map_fd={0x18, 0x5, 0x1, 0x0, r2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='GPL\x00', 0x219b, 0x0, 0x0, 0x40f00, 0x9, '\x00', r5, @fallback=0x6, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r7, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x10, 0x3}, 0x94) ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x2021) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000081139000bfa30000000000000703000000feffff720af0fff8ffffff71a4f0ff0000000071103500000000001d300500000000004704000001ed00000f030000000000001d44020000000000620a00fe040400007203000000000000b500f7ff000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a8641aa05a1336b3b4c4becea710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fe51bef7af9aa0d7d600c095199fe3380d28e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51bf900000000000000d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343cccc953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93020000000000000080e69db384ac7eeedcf2ba3a9508f9d6aba582a896a9f1e096df6ecea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00e10000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d490cba8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e1461173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b583cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e80dc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6032399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c00000000000000f59dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ed1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67cf0216e2d81e6127bd9d7fab28800eaab2355992f8ce4cd38add4b272c0bee4076ca4847ffa691cf78fb7ec212bad3bef29f577ea7159b7f3025b3d977ff7c9102"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 268.276615ms ago: executing program 1 (id=3127): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x3, 0x0, 0x100}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000000000000000000000000000711211000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x94) 0s ago: executing program 5 (id=3128): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x76, &(0x7f0000000280)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xc, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0xffffc7c5, 0x9, 0x3, 0x0, 0xffffffffffffffff, 0x9, '\x00', r0, r2, 0x1, 0x2, 0x0, 0x9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8982, &(0x7f0000000080)) kernel console output (not intermixed with test programs): ist_destroy_work_fn+0x210/0x210 [ 197.479163][ T6261] ? __kasan_check_write+0x14/0x20 [ 197.484286][ T6261] ? _copy_from_iter+0x205/0xfd0 [ 197.489228][ T6261] cgroup1_procs_write+0x2a/0x40 [ 197.494167][ T6261] ? __cfi_cgroup1_procs_write+0x10/0x10 [ 197.499803][ T6261] cgroup_file_write+0x2a7/0x580 [ 197.504772][ T6261] ? __cfi_cgroup_file_write+0x10/0x10 [ 197.510238][ T6261] ? mutex_lock+0x8d/0x1a0 [ 197.514681][ T6261] ? __cfi_mutex_lock+0x10/0x10 [ 197.519640][ T6261] ? __kasan_check_write+0x14/0x20 [ 197.524759][ T6261] kernfs_fop_write_iter+0x2d6/0x410 [ 197.530049][ T6261] ? __cfi_cgroup_file_write+0x10/0x10 [ 197.535514][ T6261] vfs_write+0x5db/0xca0 [ 197.539762][ T6261] ? slab_free_freelist_hook+0xc2/0x190 [ 197.545323][ T6261] ? __cfi_vfs_write+0x10/0x10 [ 197.550134][ T6261] ? __cfi_mutex_lock+0x10/0x10 [ 197.554992][ T6261] ? __fdget_pos+0x2cd/0x380 [ 197.559582][ T6261] ? ksys_write+0x71/0x240 [ 197.564010][ T6261] ksys_write+0x140/0x240 [ 197.568354][ T6261] ? __cfi_ksys_write+0x10/0x10 [ 197.573213][ T6261] ? debug_smp_processor_id+0x17/0x20 [ 197.578600][ T6261] __x64_sys_write+0x7b/0x90 [ 197.583200][ T6261] x64_sys_call+0x27b/0x9a0 [ 197.587707][ T6261] do_syscall_64+0x4c/0xa0 [ 197.592144][ T6261] ? clear_bhb_loop+0x30/0x80 [ 197.596839][ T6261] ? clear_bhb_loop+0x30/0x80 [ 197.601537][ T6261] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 197.607433][ T6261] RIP: 0033:0x7f18be58ebe9 [ 197.611851][ T6261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 197.631550][ T6261] RSP: 002b:00007f18bf3c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 197.639969][ T6261] RAX: ffffffffffffffda RBX: 00007f18be7c5fa0 RCX: 00007f18be58ebe9 [ 197.647943][ T6261] RDX: 0000000000000012 RSI: 0000200000000880 RDI: 0000000000000006 [ 197.655916][ T6261] RBP: 00007f18bf3c6090 R08: 0000000000000000 R09: 0000000000000000 [ 197.663906][ T6261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.671897][ T6261] R13: 00007f18be7c6038 R14: 00007f18be7c5fa0 R15: 00007fffab8f6188 [ 197.679898][ T6261] [ 199.375916][ T6314] FAULT_INJECTION: forcing a failure. [ 199.375916][ T6314] name failslab, interval 1, probability 0, space 0, times 0 [ 199.416883][ T6314] CPU: 0 PID: 6314 Comm: syz.4.1726 Tainted: G W syzkaller #0 [ 199.425796][ T6314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 199.435886][ T6314] Call Trace: [ 199.439185][ T6314] [ 199.442147][ T6314] __dump_stack+0x21/0x24 [ 199.446506][ T6314] dump_stack_lvl+0xee/0x150 [ 199.451131][ T6314] ? __cfi_dump_stack_lvl+0x8/0x8 [ 199.456212][ T6314] dump_stack+0x15/0x24 [ 199.460391][ T6314] should_fail_ex+0x3d4/0x520 [ 199.465097][ T6314] __should_failslab+0xac/0xf0 [ 199.469887][ T6314] ? allocate_cgrp_cset_links+0xdc/0x380 [ 199.475543][ T6314] should_failslab+0x9/0x20 [ 199.480069][ T6314] __kmem_cache_alloc_node+0x3d/0x2c0 [ 199.485474][ T6314] ? kasan_save_alloc_info+0x25/0x30 [ 199.490799][ T6314] ? allocate_cgrp_cset_links+0xdc/0x380 [ 199.496456][ T6314] kmalloc_trace+0x29/0xb0 [ 199.500910][ T6314] allocate_cgrp_cset_links+0xdc/0x380 [ 199.506392][ T6314] find_css_set+0x942/0x1580 [ 199.511018][ T6314] ? cgroup_migrate_prepare_dst+0x910/0x910 [ 199.516938][ T6314] ? __cfi_bpf_trace_run2+0x10/0x10 [ 199.522166][ T6314] ? _parse_integer_limit+0x18a/0x1d0 [ 199.527571][ T6314] cgroup_migrate_prepare_dst+0xe0/0x910 [ 199.533236][ T6314] cgroup_attach_task+0x2ca/0x550 [ 199.538294][ T6314] ? __cfi_cgroup_attach_task+0x10/0x10 [ 199.543908][ T6314] ? __cfi_cgroup_procs_write_start+0x10/0x10 [ 199.550003][ T6314] ? __kasan_check_write+0x14/0x20 [ 199.555153][ T6314] ? get_task_cred+0x147/0x180 [ 199.559943][ T6314] __cgroup1_procs_write+0x36f/0x520 [ 199.565262][ T6314] ? cgroup_pidlist_destroy_work_fn+0x210/0x210 [ 199.571536][ T6314] ? __kasan_check_write+0x14/0x20 [ 199.576687][ T6314] ? _copy_from_iter+0x205/0xfd0 [ 199.581670][ T6314] cgroup1_procs_write+0x2a/0x40 [ 199.586637][ T6314] ? __cfi_cgroup1_procs_write+0x10/0x10 [ 199.592299][ T6314] cgroup_file_write+0x2a7/0x580 [ 199.597279][ T6314] ? __cfi_cgroup_file_write+0x10/0x10 [ 199.602769][ T6314] ? mutex_lock+0x8d/0x1a0 [ 199.607209][ T6314] ? __cfi_mutex_lock+0x10/0x10 [ 199.612086][ T6314] ? __kasan_check_write+0x14/0x20 [ 199.617230][ T6314] kernfs_fop_write_iter+0x2d6/0x410 [ 199.622538][ T6314] ? __cfi_cgroup_file_write+0x10/0x10 [ 199.628025][ T6314] vfs_write+0x5db/0xca0 [ 199.632296][ T6314] ? slab_free_freelist_hook+0xc2/0x190 [ 199.637875][ T6314] ? __cfi_vfs_write+0x10/0x10 [ 199.642672][ T6314] ? __cfi_mutex_lock+0x10/0x10 [ 199.647550][ T6314] ? __fdget_pos+0x2cd/0x380 [ 199.652157][ T6314] ? ksys_write+0x71/0x240 [ 199.656608][ T6314] ksys_write+0x140/0x240 [ 199.660972][ T6314] ? __cfi_ksys_write+0x10/0x10 [ 199.665863][ T6314] ? debug_smp_processor_id+0x17/0x20 [ 199.671267][ T6314] __x64_sys_write+0x7b/0x90 [ 199.675893][ T6314] x64_sys_call+0x27b/0x9a0 [ 199.680428][ T6314] do_syscall_64+0x4c/0xa0 [ 199.684862][ T6314] ? clear_bhb_loop+0x30/0x80 [ 199.689562][ T6314] ? clear_bhb_loop+0x30/0x80 [ 199.694265][ T6314] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 199.700188][ T6314] RIP: 0033:0x7f6abb78ebe9 [ 199.704621][ T6314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 199.724338][ T6314] RSP: 002b:00007f6abc674038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 199.732784][ T6314] RAX: ffffffffffffffda RBX: 00007f6abb9c5fa0 RCX: 00007f6abb78ebe9 [ 199.740795][ T6314] RDX: 0000000000000012 RSI: 0000200000000880 RDI: 0000000000000006 [ 199.748804][ T6314] RBP: 00007f6abc674090 R08: 0000000000000000 R09: 0000000000000000 [ 199.756799][ T6314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.764794][ T6314] R13: 00007f6abb9c6038 R14: 00007f6abb9c5fa0 R15: 00007ffd826914c8 [ 199.772801][ T6314] [ 199.942277][ T28] audit: type=1400 audit(1757028534.167:148): avc: denied { create } for pid=6316 comm="syz.4.1728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 200.966563][ T28] audit: type=1400 audit(1757028535.197:149): avc: denied { create } for pid=6351 comm="syz.2.1740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 201.900155][ T6383] FAULT_INJECTION: forcing a failure. [ 201.900155][ T6383] name failslab, interval 1, probability 0, space 0, times 0 [ 201.947391][ T6383] CPU: 1 PID: 6383 Comm: syz.2.1748 Tainted: G W syzkaller #0 [ 201.956304][ T6383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 201.966385][ T6383] Call Trace: [ 201.969682][ T6383] [ 201.972632][ T6383] __dump_stack+0x21/0x24 [ 201.976988][ T6383] dump_stack_lvl+0xee/0x150 [ 201.981629][ T6383] ? __cfi_dump_stack_lvl+0x8/0x8 [ 201.986687][ T6383] dump_stack+0x15/0x24 [ 201.990862][ T6383] should_fail_ex+0x3d4/0x520 [ 201.995568][ T6383] __should_failslab+0xac/0xf0 [ 202.000358][ T6383] ? allocate_cgrp_cset_links+0xdc/0x380 [ 202.006021][ T6383] should_failslab+0x9/0x20 [ 202.010543][ T6383] __kmem_cache_alloc_node+0x3d/0x2c0 [ 202.015941][ T6383] ? kasan_save_alloc_info+0x25/0x30 [ 202.021869][ T6383] ? allocate_cgrp_cset_links+0xdc/0x380 [ 202.027540][ T6383] kmalloc_trace+0x29/0xb0 [ 202.031995][ T6383] allocate_cgrp_cset_links+0xdc/0x380 [ 202.037483][ T6383] find_css_set+0x942/0x1580 [ 202.042107][ T6383] ? cgroup_migrate_prepare_dst+0x910/0x910 [ 202.048032][ T6383] ? __cfi_bpf_trace_run2+0x10/0x10 [ 202.053305][ T6383] ? _parse_integer_limit+0x18a/0x1d0 [ 202.058717][ T6383] cgroup_migrate_prepare_dst+0xe0/0x910 [ 202.064377][ T6383] cgroup_attach_task+0x2ca/0x550 [ 202.069425][ T6383] ? __cfi_cgroup_attach_task+0x10/0x10 [ 202.074997][ T6383] ? __cfi_cgroup_procs_write_start+0x10/0x10 [ 202.081090][ T6383] ? __kasan_check_write+0x14/0x20 [ 202.086264][ T6383] ? get_task_cred+0x147/0x180 [ 202.091064][ T6383] __cgroup1_procs_write+0x36f/0x520 [ 202.096379][ T6383] ? cgroup_pidlist_destroy_work_fn+0x210/0x210 [ 202.102995][ T6383] ? __kasan_check_write+0x14/0x20 [ 202.108139][ T6383] ? _copy_from_iter+0x205/0xfd0 [ 202.113105][ T6383] cgroup1_procs_write+0x2a/0x40 [ 202.118069][ T6383] ? __cfi_cgroup1_procs_write+0x10/0x10 [ 202.123745][ T6383] cgroup_file_write+0x2a7/0x580 [ 202.128718][ T6383] ? __cfi_cgroup_file_write+0x10/0x10 [ 202.134211][ T6383] ? mutex_lock+0x8d/0x1a0 [ 202.138654][ T6383] ? __cfi_mutex_lock+0x10/0x10 [ 202.143540][ T6383] ? __kasan_check_write+0x14/0x20 [ 202.148685][ T6383] kernfs_fop_write_iter+0x2d6/0x410 [ 202.153995][ T6383] ? __cfi_cgroup_file_write+0x10/0x10 [ 202.159486][ T6383] vfs_write+0x5db/0xca0 [ 202.163762][ T6383] ? slab_free_freelist_hook+0xc2/0x190 [ 202.169373][ T6383] ? __cfi_vfs_write+0x10/0x10 [ 202.174171][ T6383] ? __cfi_mutex_lock+0x10/0x10 [ 202.179050][ T6383] ? __fdget_pos+0x2cd/0x380 [ 202.183662][ T6383] ? ksys_write+0x71/0x240 [ 202.188114][ T6383] ksys_write+0x140/0x240 [ 202.192469][ T6383] ? __cfi_ksys_write+0x10/0x10 [ 202.197359][ T6383] ? debug_smp_processor_id+0x17/0x20 [ 202.202765][ T6383] __x64_sys_write+0x7b/0x90 [ 202.207398][ T6383] x64_sys_call+0x27b/0x9a0 [ 202.211930][ T6383] do_syscall_64+0x4c/0xa0 [ 202.216372][ T6383] ? clear_bhb_loop+0x30/0x80 [ 202.221081][ T6383] ? clear_bhb_loop+0x30/0x80 [ 202.225785][ T6383] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 202.231705][ T6383] RIP: 0033:0x7f989fd8ebe9 [ 202.236155][ T6383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 202.255788][ T6383] RSP: 002b:00007f98a0c18038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 202.264236][ T6383] RAX: ffffffffffffffda RBX: 00007f989ffc5fa0 RCX: 00007f989fd8ebe9 [ 202.272236][ T6383] RDX: 0000000000000012 RSI: 0000200000000880 RDI: 0000000000000006 [ 202.280244][ T6383] RBP: 00007f98a0c18090 R08: 0000000000000000 R09: 0000000000000000 [ 202.288253][ T6383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 202.296294][ T6383] R13: 00007f989ffc6038 R14: 00007f989ffc5fa0 R15: 00007ffc3d09aa88 [ 202.304386][ T6383] [ 202.617498][ T6392] FAULT_INJECTION: forcing a failure. [ 202.617498][ T6392] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 202.669766][ T6392] CPU: 0 PID: 6392 Comm: syz.4.1750 Tainted: G W syzkaller #0 [ 202.678689][ T6392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 202.688863][ T6392] Call Trace: [ 202.692164][ T6392] [ 202.695111][ T6392] __dump_stack+0x21/0x24 [ 202.699466][ T6392] dump_stack_lvl+0xee/0x150 [ 202.704090][ T6392] ? __cfi_dump_stack_lvl+0x8/0x8 [ 202.709235][ T6392] ? __cfi_update_misfit_status+0x10/0x10 [ 202.714989][ T6392] dump_stack+0x15/0x24 [ 202.719169][ T6392] should_fail_ex+0x3d4/0x520 [ 202.723876][ T6392] should_fail_alloc_page+0x61/0x90 [ 202.729102][ T6392] prepare_alloc_pages+0x148/0x5f0 [ 202.734239][ T6392] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 202.739464][ T6392] __alloc_pages+0x124/0x450 [ 202.744076][ T6392] ? __cfi___alloc_pages+0x10/0x10 [ 202.749213][ T6392] ? percpu_counter_add_batch+0x13c/0x160 [ 202.754963][ T6392] __folio_alloc+0x12/0x40 [ 202.759406][ T6392] shmem_alloc_and_acct_folio+0x650/0x870 [ 202.765166][ T6392] ? shmem_replace_folio+0x590/0x590 [ 202.770479][ T6392] ? xas_load+0x39e/0x3b0 [ 202.774833][ T6392] ? __filemap_get_folio+0x93e/0x980 [ 202.780138][ T6392] ? __cfi___filemap_get_folio+0x10/0x10 [ 202.785785][ T6392] ? do_user_addr_fault+0x9ac/0x1050 [ 202.791100][ T6392] shmem_get_folio_gfp+0x119f/0x2230 [ 202.796415][ T6392] shmem_write_begin+0xea/0x2c0 [ 202.801294][ T6392] generic_perform_write+0x2f6/0x6d0 [ 202.806604][ T6392] ? __cfi_generic_perform_write+0x10/0x10 [ 202.812433][ T6392] ? __cfi_file_update_time+0x10/0x10 [ 202.817838][ T6392] __generic_file_write_iter+0x227/0x580 [ 202.823493][ T6392] ? rwsem_write_trylock+0x98/0x300 [ 202.828722][ T6392] ? __cfi___generic_file_write_iter+0x10/0x10 [ 202.834988][ T6392] ? rwsem_write_trylock+0x130/0x300 [ 202.840826][ T6392] ? generic_write_checks_count+0x3c6/0x4a0 [ 202.846749][ T6392] ? generic_write_checks+0xca/0x100 [ 202.852069][ T6392] generic_file_write_iter+0xae/0x310 [ 202.857467][ T6392] vfs_write+0x5db/0xca0 [ 202.861736][ T6392] ? slab_free_freelist_hook+0xc2/0x190 [ 202.867320][ T6392] ? __cfi_vfs_write+0x10/0x10 [ 202.872112][ T6392] ? __cfi_mutex_lock+0x10/0x10 [ 202.876985][ T6392] ? __fdget_pos+0x2cd/0x380 [ 202.881596][ T6392] ? ksys_write+0x71/0x240 [ 202.886046][ T6392] ksys_write+0x140/0x240 [ 202.890407][ T6392] ? __cfi_ksys_write+0x10/0x10 [ 202.895291][ T6392] ? debug_smp_processor_id+0x17/0x20 [ 202.900690][ T6392] __x64_sys_write+0x7b/0x90 [ 202.905318][ T6392] x64_sys_call+0x27b/0x9a0 [ 202.909845][ T6392] do_syscall_64+0x4c/0xa0 [ 202.914280][ T6392] ? clear_bhb_loop+0x30/0x80 [ 202.918978][ T6392] ? clear_bhb_loop+0x30/0x80 [ 202.923675][ T6392] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 202.929598][ T6392] RIP: 0033:0x7f6abb78ebe9 [ 202.934035][ T6392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 202.953848][ T6392] RSP: 002b:00007f6abc674038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 202.962291][ T6392] RAX: ffffffffffffffda RBX: 00007f6abb9c5fa0 RCX: 00007f6abb78ebe9 [ 202.970287][ T6392] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 000000000000000a [ 202.978293][ T6392] RBP: 00007f6abc674090 R08: 0000000000000000 R09: 0000000000000000 [ 202.986289][ T6392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.994279][ T6392] R13: 00007f6abb9c6038 R14: 00007f6abb9c5fa0 R15: 00007ffd826914c8 [ 203.002275][ T6392] [ 203.263031][ T6426] FAULT_INJECTION: forcing a failure. [ 203.263031][ T6426] name failslab, interval 1, probability 0, space 0, times 0 [ 203.298771][ T6426] CPU: 0 PID: 6426 Comm: syz.0.1762 Tainted: G W syzkaller #0 [ 203.307677][ T6426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 203.317755][ T6426] Call Trace: [ 203.321050][ T6426] [ 203.323993][ T6426] __dump_stack+0x21/0x24 [ 203.328338][ T6426] dump_stack_lvl+0xee/0x150 [ 203.332960][ T6426] ? __cfi_dump_stack_lvl+0x8/0x8 [ 203.338102][ T6426] dump_stack+0x15/0x24 [ 203.342271][ T6426] should_fail_ex+0x3d4/0x520 [ 203.346973][ T6426] __should_failslab+0xac/0xf0 [ 203.351764][ T6426] ? allocate_cgrp_cset_links+0xdc/0x380 [ 203.357418][ T6426] should_failslab+0x9/0x20 [ 203.361951][ T6426] __kmem_cache_alloc_node+0x3d/0x2c0 [ 203.367370][ T6426] ? kasan_save_alloc_info+0x25/0x30 [ 203.372710][ T6426] ? allocate_cgrp_cset_links+0xdc/0x380 [ 203.378374][ T6426] kmalloc_trace+0x29/0xb0 [ 203.382836][ T6426] allocate_cgrp_cset_links+0xdc/0x380 [ 203.388330][ T6426] find_css_set+0x942/0x1580 [ 203.392946][ T6426] ? cgroup_migrate_prepare_dst+0x910/0x910 [ 203.398858][ T6426] ? __cfi_bpf_trace_run2+0x10/0x10 [ 203.404091][ T6426] ? _parse_integer_limit+0x18a/0x1d0 [ 203.409547][ T6426] cgroup_migrate_prepare_dst+0xe0/0x910 [ 203.415210][ T6426] cgroup_attach_task+0x2ca/0x550 [ 203.420260][ T6426] ? __cfi_cgroup_attach_task+0x10/0x10 [ 203.425835][ T6426] ? __cfi_cgroup_procs_write_start+0x10/0x10 [ 203.431922][ T6426] ? __kasan_check_write+0x14/0x20 [ 203.437151][ T6426] ? get_task_cred+0x147/0x180 [ 203.441936][ T6426] __cgroup1_procs_write+0x36f/0x520 [ 203.447245][ T6426] ? cgroup_pidlist_destroy_work_fn+0x210/0x210 [ 203.453513][ T6426] ? __kasan_check_write+0x14/0x20 [ 203.458753][ T6426] ? _copy_from_iter+0x205/0xfd0 [ 203.463716][ T6426] cgroup1_procs_write+0x2a/0x40 [ 203.468677][ T6426] ? __cfi_cgroup1_procs_write+0x10/0x10 [ 203.474333][ T6426] cgroup_file_write+0x2a7/0x580 [ 203.479326][ T6426] ? __cfi_cgroup_file_write+0x10/0x10 [ 203.484816][ T6426] ? mutex_lock+0x8d/0x1a0 [ 203.489264][ T6426] ? __cfi_mutex_lock+0x10/0x10 [ 203.494139][ T6426] ? __kasan_check_write+0x14/0x20 [ 203.499283][ T6426] kernfs_fop_write_iter+0x2d6/0x410 [ 203.504589][ T6426] ? __cfi_cgroup_file_write+0x10/0x10 [ 203.510074][ T6426] vfs_write+0x5db/0xca0 [ 203.514357][ T6426] ? slab_free_freelist_hook+0xc2/0x190 [ 203.519959][ T6426] ? __cfi_vfs_write+0x10/0x10 [ 203.524753][ T6426] ? __cfi_mutex_lock+0x10/0x10 [ 203.529655][ T6426] ? __fdget_pos+0x2cd/0x380 [ 203.534272][ T6426] ? ksys_write+0x71/0x240 [ 203.538738][ T6426] ksys_write+0x140/0x240 [ 203.543100][ T6426] ? __cfi_ksys_write+0x10/0x10 [ 203.547982][ T6426] ? debug_smp_processor_id+0x17/0x20 [ 203.553376][ T6426] __x64_sys_write+0x7b/0x90 [ 203.557982][ T6426] x64_sys_call+0x27b/0x9a0 [ 203.562490][ T6426] do_syscall_64+0x4c/0xa0 [ 203.566907][ T6426] ? clear_bhb_loop+0x30/0x80 [ 203.571591][ T6426] ? clear_bhb_loop+0x30/0x80 [ 203.576274][ T6426] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 203.582174][ T6426] RIP: 0033:0x7fe3be38ebe9 [ 203.586598][ T6426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 203.606232][ T6426] RSP: 002b:00007fe3bf2b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 203.614647][ T6426] RAX: ffffffffffffffda RBX: 00007fe3be5c5fa0 RCX: 00007fe3be38ebe9 [ 203.622633][ T6426] RDX: 0000000000000012 RSI: 0000200000000880 RDI: 0000000000000006 [ 203.630612][ T6426] RBP: 00007fe3bf2b7090 R08: 0000000000000000 R09: 0000000000000000 [ 203.638599][ T6426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.646575][ T6426] R13: 00007fe3be5c6038 R14: 00007fe3be5c5fa0 R15: 00007ffe88330268 [ 203.654564][ T6426] [ 204.047420][ T6446] device pim6reg1 entered promiscuous mode [ 204.302498][ T6451] FAULT_INJECTION: forcing a failure. [ 204.302498][ T6451] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 204.316075][ T6451] CPU: 0 PID: 6451 Comm: syz.0.1768 Tainted: G W syzkaller #0 [ 204.324955][ T6451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 204.335059][ T6451] Call Trace: [ 204.338355][ T6451] [ 204.341306][ T6451] __dump_stack+0x21/0x24 [ 204.345658][ T6451] dump_stack_lvl+0xee/0x150 [ 204.350383][ T6451] ? __cfi_dump_stack_lvl+0x8/0x8 [ 204.355439][ T6451] ? __kasan_check_write+0x14/0x20 [ 204.360581][ T6451] ? _raw_spin_lock_irq+0x8f/0xe0 [ 204.365730][ T6451] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 204.371314][ T6451] dump_stack+0x15/0x24 [ 204.375511][ T6451] should_fail_ex+0x3d4/0x520 [ 204.380219][ T6451] should_fail+0xb/0x10 [ 204.384401][ T6451] should_fail_usercopy+0x1a/0x20 [ 204.389515][ T6451] copy_page_from_iter_atomic+0x35c/0x1210 [ 204.395360][ T6451] ? __cfi_copy_page_from_iter_atomic+0x10/0x10 [ 204.401647][ T6451] ? __kasan_check_read+0x11/0x20 [ 204.406709][ T6451] ? shmem_write_begin+0x151/0x2c0 [ 204.411854][ T6451] generic_perform_write+0x348/0x6d0 [ 204.417175][ T6451] ? __cfi_generic_perform_write+0x10/0x10 [ 204.423030][ T6451] ? __cfi_file_update_time+0x10/0x10 [ 204.428438][ T6451] __generic_file_write_iter+0x227/0x580 [ 204.434441][ T6451] ? __rcu_report_exp_rnp+0x1aa/0x1b0 [ 204.439846][ T6451] ? __cfi___generic_file_write_iter+0x10/0x10 [ 204.446028][ T6451] ? rwsem_write_trylock+0x130/0x300 [ 204.451358][ T6451] ? generic_write_checks_count+0x3c6/0x4a0 [ 204.457300][ T6451] ? generic_write_checks+0xca/0x100 [ 204.462624][ T6451] generic_file_write_iter+0xae/0x310 [ 204.468035][ T6451] vfs_write+0x5db/0xca0 [ 204.472316][ T6451] ? __cfi_vfs_write+0x10/0x10 [ 204.477114][ T6451] ? __cfi_mutex_lock+0x10/0x10 [ 204.482015][ T6451] ? __fdget_pos+0x2cd/0x380 [ 204.486713][ T6451] ? ksys_write+0x71/0x240 [ 204.491164][ T6451] ksys_write+0x140/0x240 [ 204.495526][ T6451] ? __cfi_ksys_write+0x10/0x10 [ 204.500413][ T6451] __x64_sys_write+0x7b/0x90 [ 204.505037][ T6451] x64_sys_call+0x27b/0x9a0 [ 204.509563][ T6451] do_syscall_64+0x4c/0xa0 [ 204.513994][ T6451] ? clear_bhb_loop+0x30/0x80 [ 204.518703][ T6451] ? clear_bhb_loop+0x30/0x80 [ 204.523431][ T6451] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 204.529347][ T6451] RIP: 0033:0x7fe3be38ebe9 [ 204.533795][ T6451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.553450][ T6451] RSP: 002b:00007fe3bf2b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 204.561890][ T6451] RAX: ffffffffffffffda RBX: 00007fe3be5c5fa0 RCX: 00007fe3be38ebe9 [ 204.569890][ T6451] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 000000000000000a [ 204.577928][ T6451] RBP: 00007fe3bf2b7090 R08: 0000000000000000 R09: 0000000000000000 [ 204.585928][ T6451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 204.593922][ T6451] R13: 00007fe3be5c6038 R14: 00007fe3be5c5fa0 R15: 00007ffe88330268 [ 204.601928][ T6451] [ 205.498814][ T6470] FAULT_INJECTION: forcing a failure. [ 205.498814][ T6470] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 205.572973][ T6470] CPU: 1 PID: 6470 Comm: syz.2.1774 Tainted: G W syzkaller #0 [ 205.581883][ T6470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 205.591962][ T6470] Call Trace: [ 205.595262][ T6470] [ 205.598211][ T6470] __dump_stack+0x21/0x24 [ 205.602566][ T6470] dump_stack_lvl+0xee/0x150 [ 205.607194][ T6470] ? __cfi_dump_stack_lvl+0x8/0x8 [ 205.612249][ T6470] ? format_decode+0x1bb/0x1520 [ 205.617134][ T6470] dump_stack+0x15/0x24 [ 205.621318][ T6470] should_fail_ex+0x3d4/0x520 [ 205.626028][ T6470] should_fail+0xb/0x10 [ 205.630209][ T6470] should_fail_usercopy+0x1a/0x20 [ 205.635263][ T6470] _copy_from_user+0x1e/0xc0 [ 205.639919][ T6470] kstrtouint_from_user+0xbe/0x150 [ 205.645076][ T6470] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 205.650824][ T6470] ? __kasan_check_read+0x11/0x20 [ 205.655883][ T6470] ? _copy_to_user+0x72/0x90 [ 205.660509][ T6470] ? simple_read_from_buffer+0x10f/0x160 [ 205.666167][ T6470] proc_fail_nth_write+0x85/0x1f0 [ 205.671212][ T6470] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 205.676892][ T6470] ? security_file_permission+0x8a/0xb0 [ 205.682464][ T6470] ? security_file_permission+0x94/0xb0 [ 205.688033][ T6470] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 205.693700][ T6470] vfs_write+0x40c/0xca0 [ 205.698144][ T6470] ? __kasan_check_read+0x11/0x20 [ 205.703378][ T6470] ? __cfi_vfs_write+0x10/0x10 [ 205.708167][ T6470] ? __kasan_check_write+0x14/0x20 [ 205.713320][ T6470] ? mutex_lock+0x8d/0x1a0 [ 205.717765][ T6470] ? __cfi_mutex_lock+0x10/0x10 [ 205.722648][ T6470] ? __fdget_pos+0x2cd/0x380 [ 205.727259][ T6470] ? ksys_write+0x71/0x240 [ 205.731708][ T6470] ksys_write+0x140/0x240 [ 205.736055][ T6470] ? __cfi_ksys_write+0x10/0x10 [ 205.740943][ T6470] ? debug_smp_processor_id+0x17/0x20 [ 205.746329][ T6470] __x64_sys_write+0x7b/0x90 [ 205.750928][ T6470] x64_sys_call+0x27b/0x9a0 [ 205.755436][ T6470] do_syscall_64+0x4c/0xa0 [ 205.759852][ T6470] ? clear_bhb_loop+0x30/0x80 [ 205.764624][ T6470] ? clear_bhb_loop+0x30/0x80 [ 205.769307][ T6470] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 205.775382][ T6470] RIP: 0033:0x7f989fd8d69f [ 205.779800][ T6470] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 205.799415][ T6470] RSP: 002b:00007f98a0c18030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 205.807832][ T6470] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f989fd8d69f [ 205.815806][ T6470] RDX: 0000000000000001 RSI: 00007f98a0c180a0 RDI: 0000000000000007 [ 205.823777][ T6470] RBP: 00007f98a0c18090 R08: 0000000000000000 R09: 0000000000000000 [ 205.831748][ T6470] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 205.839722][ T6470] R13: 00007f989ffc6038 R14: 00007f989ffc5fa0 R15: 00007ffc3d09aa88 [ 205.847705][ T6470] [ 205.997079][ T6481] device pim6reg1 entered promiscuous mode [ 207.214468][ T6529] device pim6reg1 entered promiscuous mode [ 207.443451][ T6556] device sit0 left promiscuous mode [ 208.303560][ T6597] device sit0 left promiscuous mode [ 209.479660][ T6650] device wg2 left promiscuous mode [ 209.514871][ T6650] device wg2 entered promiscuous mode [ 209.713932][ T28] audit: type=1400 audit(1757028543.947:150): avc: denied { write } for pid=6659 comm="syz.3.1830" name="cgroup.subtree_control" dev="cgroup2" ino=412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 209.874498][ T28] audit: type=1400 audit(1757028543.947:151): avc: denied { open } for pid=6659 comm="syz.3.1830" path="" dev="cgroup2" ino=412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 210.713432][ T6702] device pim6reg1 entered promiscuous mode [ 212.170780][ T6723] device veth1_macvtap entered promiscuous mode [ 212.185934][ T6723] device macsec0 entered promiscuous mode [ 212.193668][ T6721] syz.1.1847 (6721) used obsolete PPPIOCDETACH ioctl [ 212.251372][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 212.324892][ T6726] device pim6reg1 entered promiscuous mode [ 213.645365][ T6771] device pim6reg1 entered promiscuous mode [ 214.870761][ T6813] device pim6reg1 entered promiscuous mode [ 215.060709][ T6821] device wg2 entered promiscuous mode [ 215.088372][ T6831] syzkaller1: tun_chr_ioctl cmd 2147767517 [ 215.104906][ T6821] device bridge_slave_1 left promiscuous mode [ 215.111996][ T6821] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.186212][ T6821] device bridge_slave_0 left promiscuous mode [ 215.227711][ T6821] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.373155][ T6839] device sit0 entered promiscuous mode [ 215.590934][ T6847] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 215.598633][ T6849] device pim6reg1 entered promiscuous mode [ 215.830998][ T6878] device pim6reg1 entered promiscuous mode [ 218.133909][ T28] audit: type=1400 audit(1757028552.367:152): avc: denied { create } for pid=6922 comm="syz.1.1905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 219.028860][ T6931] device pim6reg1 entered promiscuous mode [ 219.307829][ T6939] device pim6reg1 entered promiscuous mode [ 220.649675][ T6969] device sit0 left promiscuous mode [ 220.690812][ T6969] device sit0 entered promiscuous mode [ 220.974861][ T6974] device pim6reg1 entered promiscuous mode [ 222.278626][ T7009] device pim6reg1 entered promiscuous mode [ 223.780572][ T28] audit: type=1400 audit(1757028558.007:153): avc: denied { create } for pid=7048 comm="syz.0.1947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 224.005041][ T28] audit: type=1400 audit(1757028558.237:154): avc: denied { create } for pid=7064 comm="syz.1.1951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 224.222477][ T7087] device pim6reg1 entered promiscuous mode [ 224.278680][ T7092] syz.4.1960[7092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.278764][ T7092] syz.4.1960[7092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.147074][ T7116] bridge0: port 3(veth1_macvtap) entered blocking state [ 225.173086][ T7116] bridge0: port 3(veth1_macvtap) entered disabled state [ 226.879610][ T7191] device wg2 left promiscuous mode [ 226.897786][ T7191] device wg2 entered promiscuous mode [ 227.033177][ T7193] cgroup: fork rejected by pids controller in /syz0 [ 227.296559][ T7322] FAULT_INJECTION: forcing a failure. [ 227.296559][ T7322] name failslab, interval 1, probability 0, space 0, times 0 [ 227.353033][ T7322] CPU: 1 PID: 7322 Comm: syz.3.1997 Tainted: G W syzkaller #0 [ 227.361953][ T7322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 227.372036][ T7322] Call Trace: [ 227.375345][ T7322] [ 227.378296][ T7322] __dump_stack+0x21/0x24 [ 227.382656][ T7322] dump_stack_lvl+0xee/0x150 [ 227.387293][ T7322] ? __cfi_dump_stack_lvl+0x8/0x8 [ 227.392364][ T7322] ? pfifo_fast_reset+0xe1f/0xef0 [ 227.397424][ T7322] dump_stack+0x15/0x24 [ 227.401609][ T7322] should_fail_ex+0x3d4/0x520 [ 227.406318][ T7322] __should_failslab+0xac/0xf0 [ 227.411119][ T7322] should_failslab+0x9/0x20 [ 227.415651][ T7322] kmem_cache_alloc_node+0x42/0x340 [ 227.420959][ T7322] ? __alloc_skb+0xea/0x4b0 [ 227.425556][ T7322] ? br_get_link_af_size_filtered+0xe0/0x180 [ 227.431600][ T7322] __alloc_skb+0xea/0x4b0 [ 227.435973][ T7322] rtmsg_ifinfo_build_skb+0x7c/0x190 [ 227.441288][ T7322] rtmsg_ifinfo+0x7a/0x130 [ 227.445723][ T7322] dev_close_many+0x279/0x4d0 [ 227.450405][ T7322] ? __kernel_text_address+0xd/0x30 [ 227.455616][ T7322] ? __cfi_dev_close_many+0x10/0x10 [ 227.460845][ T7322] ? __kasan_check_read+0x11/0x20 [ 227.465885][ T7322] unregister_netdevice_many+0x439/0x1820 [ 227.471613][ T7322] ? __stack_depot_save+0x36/0x480 [ 227.476726][ T7322] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 227.482533][ T7322] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 227.488692][ T7322] ? ref_tracker_alloc+0x2a5/0x430 [ 227.493808][ T7322] ? __kasan_check_write+0x14/0x20 [ 227.498933][ T7322] ? queue_delayed_work_on+0x101/0x150 [ 227.504404][ T7322] ? linkwatch_fire_event+0x1d2/0x240 [ 227.509791][ T7322] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 227.515692][ T7322] ? exit_to_user_mode_loop+0x9b/0xb0 [ 227.521071][ T7322] ? __kasan_check_read+0x11/0x20 [ 227.526108][ T7322] unregister_netdevice_queue+0x31c/0x360 [ 227.531833][ T7322] ? linkwatch_schedule_work+0x161/0x190 [ 227.537470][ T7322] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 227.543716][ T7322] ? linkwatch_fire_event+0x1ed/0x240 [ 227.549097][ T7322] __tun_detach+0xca6/0x1460 [ 227.553695][ T7322] tun_chr_close+0x92/0x140 [ 227.558197][ T7322] ? __cfi_tun_chr_close+0x10/0x10 [ 227.563312][ T7322] __fput+0x1fc/0x8f0 [ 227.567304][ T7322] ____fput+0x15/0x20 [ 227.571286][ T7322] task_work_run+0x1db/0x240 [ 227.575891][ T7322] ? __cfi_task_work_run+0x10/0x10 [ 227.581006][ T7322] ? filp_close+0x111/0x160 [ 227.585522][ T7322] exit_to_user_mode_loop+0x9b/0xb0 [ 227.590729][ T7322] exit_to_user_mode_prepare+0x5a/0xa0 [ 227.596191][ T7322] syscall_exit_to_user_mode+0x1a/0x30 [ 227.601654][ T7322] do_syscall_64+0x58/0xa0 [ 227.606081][ T7322] ? clear_bhb_loop+0x30/0x80 [ 227.610763][ T7322] ? clear_bhb_loop+0x30/0x80 [ 227.615452][ T7322] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 227.621355][ T7322] RIP: 0033:0x7f18be58ebe9 [ 227.625770][ T7322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 227.645377][ T7322] RSP: 002b:00007f18bf3c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 227.653800][ T7322] RAX: 0000000000000000 RBX: 00007f18be7c5fa0 RCX: 00007f18be58ebe9 [ 227.661773][ T7322] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 227.669744][ T7322] RBP: 00007f18bf3c6090 R08: 0000000000000000 R09: 0000000000000000 [ 227.677728][ T7322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 227.685700][ T7322] R13: 00007f18be7c6038 R14: 00007f18be7c5fa0 R15: 00007fffab8f6188 [ 227.693767][ T7322] [ 228.806591][ T28] audit: type=1400 audit(1757028563.037:155): avc: denied { create } for pid=7646 comm="syz.3.2005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 230.051488][T10545] FAULT_INJECTION: forcing a failure. [ 230.051488][T10545] name failslab, interval 1, probability 0, space 0, times 0 [ 230.083355][T10545] CPU: 1 PID: 10545 Comm: syz.2.2056 Tainted: G W syzkaller #0 [ 230.092361][T10545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 230.102440][T10545] Call Trace: [ 230.105764][T10545] [ 230.108707][T10545] __dump_stack+0x21/0x24 [ 230.113048][T10545] dump_stack_lvl+0xee/0x150 [ 230.117654][T10545] ? __cfi_dump_stack_lvl+0x8/0x8 [ 230.122692][T10545] dump_stack+0x15/0x24 [ 230.126848][T10545] should_fail_ex+0x3d4/0x520 [ 230.131534][T10545] __should_failslab+0xac/0xf0 [ 230.136301][T10545] ? nf_nat_masq_schedule+0x238/0x4e0 [ 230.141682][T10545] should_failslab+0x9/0x20 [ 230.146188][T10545] __kmem_cache_alloc_node+0x3d/0x2c0 [ 230.151566][T10545] ? detach_if_pending+0xf4/0x300 [ 230.156690][T10545] ? nf_nat_masq_schedule+0x238/0x4e0 [ 230.162095][T10545] kmalloc_trace+0x29/0xb0 [ 230.166812][T10545] nf_nat_masq_schedule+0x238/0x4e0 [ 230.172101][T10545] ? __kasan_check_write+0x14/0x20 [ 230.177247][T10545] ? __cfi_device_cmp+0x10/0x10 [ 230.182114][T10545] ? masq_device_event+0xd0/0xd0 [ 230.187064][T10545] ? nfqnl_rcv_dev_event+0x441/0x470 [ 230.192362][T10545] ? rtnl_is_locked+0x15/0x20 [ 230.197052][T10545] masq_device_event+0x9b/0xd0 [ 230.201844][T10545] raw_notifier_call_chain+0xa1/0x110 [ 230.207247][T10545] dev_close_many+0x32d/0x4d0 [ 230.211936][T10545] ? __cfi_dev_close_many+0x10/0x10 [ 230.217141][T10545] ? enqueue_timer+0x1b6/0x480 [ 230.221920][T10545] ? __kasan_check_read+0x11/0x20 [ 230.226960][T10545] unregister_netdevice_many+0x439/0x1820 [ 230.232692][T10545] ? add_timer+0x68/0x80 [ 230.236944][T10545] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 230.243112][T10545] ? __queue_delayed_work+0x173/0x200 [ 230.248493][T10545] ? queue_delayed_work_on+0x101/0x150 [ 230.253954][T10545] ? linkwatch_fire_event+0x1d2/0x240 [ 230.259334][T10545] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 230.265151][T10545] ? exit_to_user_mode_loop+0x9b/0xb0 [ 230.270525][T10545] ? __kasan_check_read+0x11/0x20 [ 230.275564][T10545] unregister_netdevice_queue+0x31c/0x360 [ 230.281289][T10545] ? linkwatch_schedule_work+0x161/0x190 [ 230.286933][T10545] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 230.293213][T10545] ? linkwatch_fire_event+0x1ed/0x240 [ 230.298601][T10545] __tun_detach+0xca6/0x1460 [ 230.303202][T10545] tun_chr_close+0x92/0x140 [ 230.307708][T10545] ? __cfi_tun_chr_close+0x10/0x10 [ 230.312826][T10545] __fput+0x1fc/0x8f0 [ 230.316818][T10545] ____fput+0x15/0x20 [ 230.320801][T10545] task_work_run+0x1db/0x240 [ 230.325397][T10545] ? __cfi_task_work_run+0x10/0x10 [ 230.330514][T10545] ? filp_close+0x111/0x160 [ 230.335040][T10545] exit_to_user_mode_loop+0x9b/0xb0 [ 230.340243][T10545] exit_to_user_mode_prepare+0x5a/0xa0 [ 230.345707][T10545] syscall_exit_to_user_mode+0x1a/0x30 [ 230.351178][T10545] do_syscall_64+0x58/0xa0 [ 230.355602][T10545] ? clear_bhb_loop+0x30/0x80 [ 230.360289][T10545] ? clear_bhb_loop+0x30/0x80 [ 230.364974][T10545] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 230.370869][T10545] RIP: 0033:0x7f989fd8ebe9 [ 230.375291][T10545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 230.394898][T10545] RSP: 002b:00007f98a0c18038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 230.403318][T10545] RAX: 0000000000000000 RBX: 00007f989ffc5fa0 RCX: 00007f989fd8ebe9 [ 230.411297][T10545] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 230.419268][T10545] RBP: 00007f98a0c18090 R08: 0000000000000000 R09: 0000000000000000 [ 230.427240][T10545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 230.435211][T10545] R13: 00007f989ffc6038 R14: 00007f989ffc5fa0 R15: 00007ffc3d09aa88 [ 230.443191][T10545] [ 230.812168][T10854] device pim6reg1 entered promiscuous mode [ 230.970563][T11655] device pim6reg1 entered promiscuous mode [ 231.260308][T11990] syz.4.2079 (11990) used greatest stack depth: 21408 bytes left [ 231.675247][T12378] device pim6reg1 entered promiscuous mode [ 232.442853][T13086] device pim6reg1 entered promiscuous mode [ 233.611664][T14078] device pim6reg1 entered promiscuous mode [ 234.222462][T15208] device syzkaller0 entered promiscuous mode [ 234.249905][T15395] device wg2 left promiscuous mode [ 234.288268][T15557] device wg2 entered promiscuous mode [ 235.003724][T16486] device sit0 left promiscuous mode [ 235.112984][T16657] device sit0 entered promiscuous mode [ 235.475524][T16893] ip6_vti0: mtu greater than device maximum [ 237.526712][T18984] ±ÿ: renamed from team_slave_1 [ 238.784223][T20428] device pim6reg1 entered promiscuous mode [ 239.461297][T21216] device pim6reg1 entered promiscuous mode [ 240.251560][T22102] device wg2 left promiscuous mode [ 240.281847][T22103] device wg2 entered promiscuous mode [ 240.440651][T22314] device pim6reg1 entered promiscuous mode [ 240.648858][T22656] device pim6reg1 entered promiscuous mode [ 241.394445][T23462] device pim6reg1 entered promiscuous mode [ 246.203243][T24806] pim6reg: tun_chr_ioctl cmd 1074025675 [ 246.217160][T24806] pim6reg: persist disabled [ 246.247672][T24807] syz.2.2323[24807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.247751][T24807] syz.2.2323[24807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.277732][T24892] device pim6reg1 entered promiscuous mode [ 246.403672][T25121] device sit0 entered promiscuous mode [ 246.509687][T25226] device pim6reg1 entered promiscuous mode [ 248.430820][T26299] device syzkaller0 entered promiscuous mode [ 249.261547][T27227] device pim6reg1 entered promiscuous mode [ 249.868553][T27835] device syzkaller0 entered promiscuous mode [ 250.633225][T28278] device syzkaller0 entered promiscuous mode [ 250.926728][T28293] device sit0 entered promiscuous mode [ 251.143649][T28285] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.183004][T28285] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.190671][T28285] device bridge_slave_0 entered promiscuous mode [ 251.329205][T28285] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.418646][T28285] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.495487][T28285] device bridge_slave_1 entered promiscuous mode [ 251.571463][ T337] device erspan0 left promiscuous mode [ 251.580062][ T337] syzkaller: port 1(erspan0) entered disabled state [ 251.971624][ T337] device veth1_macvtap left promiscuous mode [ 251.978026][ T337] device veth0_vlan left promiscuous mode [ 252.153015][T28331] device pim6reg1 entered promiscuous mode [ 252.170952][T28333] device syzkaller0 entered promiscuous mode [ 252.223759][ T28] audit: type=1400 audit(1757028586.457:156): avc: denied { create } for pid=28285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 252.246816][ T28] audit: type=1400 audit(1757028586.477:157): avc: denied { write } for pid=28285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 252.374476][ T28] audit: type=1400 audit(1757028586.477:158): avc: denied { read } for pid=28285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 252.560818][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.569043][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.586984][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.596599][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.605311][ T3386] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.612504][ T3386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.679215][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.687718][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.696561][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.706741][ T3386] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.713849][ T3386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.722074][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.730526][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.757375][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 252.769258][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 252.812110][T28285] device veth0_vlan entered promiscuous mode [ 252.869078][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 252.883410][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.927762][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.937980][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.991642][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.000932][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.014327][T28285] device veth1_macvtap entered promiscuous mode [ 253.080476][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.093051][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.101562][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.111292][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.120474][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 253.219794][T28379] device pim6reg1 entered promiscuous mode [ 253.230515][T28382] device macsec0 entered promiscuous mode [ 253.489993][T28393] device pim6reg1 entered promiscuous mode [ 254.200517][T28418] device syzkaller0 entered promiscuous mode [ 254.687188][T28433] device pim6reg1 entered promiscuous mode [ 255.993640][T28468] device pim6reg1 entered promiscuous mode [ 256.267481][T28488] device sit0 left promiscuous mode [ 257.479370][T28512] device pim6reg1 entered promiscuous mode [ 257.788960][T28536] device pim6reg1 entered promiscuous mode [ 258.465336][T28554] device veth0_to_bond entered promiscuous mode [ 258.944413][T28570] device pim6reg1 entered promiscuous mode [ 259.579572][T28600] bond_slave_1: mtu less than device minimum [ 259.891861][T28614] FAULT_INJECTION: forcing a failure. [ 259.891861][T28614] name failslab, interval 1, probability 0, space 0, times 0 [ 259.904558][T28614] CPU: 0 PID: 28614 Comm: syz.3.2489 Tainted: G W syzkaller #0 [ 259.913535][T28614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 259.923646][T28614] Call Trace: [ 259.927093][T28614] [ 259.930041][T28614] __dump_stack+0x21/0x24 [ 259.934445][T28614] dump_stack_lvl+0xee/0x150 [ 259.939162][T28614] ? __cfi_dump_stack_lvl+0x8/0x8 [ 259.944221][T28614] dump_stack+0x15/0x24 [ 259.948404][T28614] should_fail_ex+0x3d4/0x520 [ 259.953129][T28614] __should_failslab+0xac/0xf0 [ 259.957933][T28614] should_failslab+0x9/0x20 [ 259.962456][T28614] kmem_cache_alloc_node+0x42/0x340 [ 259.967685][T28614] ? __alloc_skb+0xea/0x4b0 [ 259.972228][T28614] __alloc_skb+0xea/0x4b0 [ 259.976587][T28614] ? __fib6_drop_pcpu_from+0x28b/0x2b0 [ 259.982080][T28614] inet6_rt_notify+0x2a2/0x470 [ 259.987049][T28614] ? __kasan_check_read+0x11/0x20 [ 259.992722][T28614] ? fib6_purge_rt+0x2ed/0x630 [ 259.997609][T28614] ? __cfi_inet6_rt_notify+0x10/0x10 [ 260.002928][T28614] fib6_del+0xbdd/0xf50 [ 260.007133][T28614] ? __cfi_fib6_del+0x10/0x10 [ 260.011823][T28614] ? update_load_avg+0x4c2/0x13f0 [ 260.016861][T28614] ? fib6_ifdown+0x2eb/0x4e0 [ 260.021473][T28614] fib6_clean_node+0x2a4/0x530 [ 260.026327][T28614] ? __cfi_fib6_clean_node+0x10/0x10 [ 260.031625][T28614] ? __kasan_check_write+0x14/0x20 [ 260.036847][T28614] ? resched_curr+0x10e/0x380 [ 260.041647][T28614] fib6_walk_continue+0x50e/0x710 [ 260.046676][T28614] fib6_walk+0x153/0x290 [ 260.050924][T28614] fib6_clean_all+0x16a/0x230 [ 260.055650][T28614] ? tracing_record_taskinfo_sched_switch+0x80/0x3a0 [ 260.062328][T28614] ? probe_sched_wakeup+0x5e/0x90 [ 260.067355][T28614] ? __cfi_fib6_ifdown+0x10/0x10 [ 260.072301][T28614] ? __cfi_fib6_clean_all+0x10/0x10 [ 260.077503][T28614] ? __cfi_fib6_clean_node+0x10/0x10 [ 260.082793][T28614] ? __cfi_fib6_ifdown+0x10/0x10 [ 260.087744][T28614] ? __cfi_preempt_schedule+0x10/0x10 [ 260.093119][T28614] ? try_to_wake_up+0x613/0x1220 [ 260.098144][T28614] rt6_disable_ip+0x11b/0x8f0 [ 260.102828][T28614] ? preempt_schedule_thunk+0x16/0x18 [ 260.108206][T28614] ? __queue_work+0x9df/0xd30 [ 260.112905][T28614] ? __cfi_rt6_disable_ip+0x10/0x10 [ 260.118125][T28614] ? __kasan_check_read+0x11/0x20 [ 260.123178][T28614] addrconf_ifdown+0x15d/0x1910 [ 260.128055][T28614] ? __fput+0x1fc/0x8f0 [ 260.132213][T28614] ? ____fput+0x15/0x20 [ 260.136374][T28614] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 260.142449][T28614] ? __kasan_kmalloc+0x95/0xb0 [ 260.147228][T28614] ? addrconf_cleanup+0x130/0x130 [ 260.152809][T28614] ? __kasan_check_write+0x14/0x20 [ 260.157977][T28614] ? mutex_unlock+0x89/0x220 [ 260.162575][T28614] ? __cfi_mutex_unlock+0x10/0x10 [ 260.167605][T28614] ? __cfi_device_cmp+0x10/0x10 [ 260.172466][T28614] ? masq_device_event+0xd0/0xd0 [ 260.177415][T28614] addrconf_notify+0x39f/0xe40 [ 260.182198][T28614] ? ip6mr_device_event+0x1e0/0x200 [ 260.187496][T28614] raw_notifier_call_chain+0xa1/0x110 [ 260.192902][T28614] dev_close_many+0x32d/0x4d0 [ 260.197594][T28614] ? __kernel_text_address+0xd/0x30 [ 260.202978][T28614] ? __cfi_dev_close_many+0x10/0x10 [ 260.208195][T28614] ? __kasan_check_read+0x11/0x20 [ 260.213261][T28614] unregister_netdevice_many+0x439/0x1820 [ 260.218996][T28614] ? __stack_depot_save+0x36/0x480 [ 260.224118][T28614] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 260.229930][T28614] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 260.236090][T28614] ? ref_tracker_alloc+0x2a5/0x430 [ 260.241246][T28614] ? __kasan_check_write+0x14/0x20 [ 260.246369][T28614] ? queue_delayed_work_on+0x101/0x150 [ 260.251842][T28614] ? linkwatch_fire_event+0x1d2/0x240 [ 260.257219][T28614] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 260.263053][T28614] ? exit_to_user_mode_loop+0x9b/0xb0 [ 260.268440][T28614] ? __kasan_check_read+0x11/0x20 [ 260.273477][T28614] unregister_netdevice_queue+0x31c/0x360 [ 260.279201][T28614] ? linkwatch_schedule_work+0x161/0x190 [ 260.284842][T28614] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 260.291088][T28614] ? linkwatch_fire_event+0x1ed/0x240 [ 260.296465][T28614] __tun_detach+0xca6/0x1460 [ 260.301063][T28614] tun_chr_close+0x92/0x140 [ 260.305562][T28614] ? __cfi_tun_chr_close+0x10/0x10 [ 260.310677][T28614] __fput+0x1fc/0x8f0 [ 260.314677][T28614] ____fput+0x15/0x20 [ 260.318758][T28614] task_work_run+0x1db/0x240 [ 260.323380][T28614] ? __cfi_task_work_run+0x10/0x10 [ 260.328494][T28614] ? filp_close+0x111/0x160 [ 260.333006][T28614] exit_to_user_mode_loop+0x9b/0xb0 [ 260.338204][T28614] exit_to_user_mode_prepare+0x5a/0xa0 [ 260.343664][T28614] syscall_exit_to_user_mode+0x1a/0x30 [ 260.349128][T28614] do_syscall_64+0x58/0xa0 [ 260.353556][T28614] ? clear_bhb_loop+0x30/0x80 [ 260.358242][T28614] ? clear_bhb_loop+0x30/0x80 [ 260.362925][T28614] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 260.369009][T28614] RIP: 0033:0x7f18be58ebe9 [ 260.373429][T28614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 260.393036][T28614] RSP: 002b:00007f18bf3c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 260.401452][T28614] RAX: 0000000000000000 RBX: 00007f18be7c5fa0 RCX: 00007f18be58ebe9 [ 260.409427][T28614] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 260.417397][T28614] RBP: 00007f18bf3c6090 R08: 0000000000000000 R09: 0000000000000000 [ 260.425366][T28614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 260.433335][T28614] R13: 00007f18be7c6038 R14: 00007f18be7c5fa0 R15: 00007fffab8f6188 [ 260.441318][T28614] [ 261.061398][T28628] device pim6reg1 left promiscuous mode [ 261.839898][T28632] device wg2 left promiscuous mode [ 261.893402][T28646] device wg2 entered promiscuous mode [ 261.914814][T28630] device pim6reg1 entered promiscuous mode [ 264.009169][T28714] FAULT_INJECTION: forcing a failure. [ 264.009169][T28714] name failslab, interval 1, probability 0, space 0, times 0 [ 264.021951][T28714] CPU: 1 PID: 28714 Comm: syz.1.2518 Tainted: G W syzkaller #0 [ 264.030917][T28714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 264.040994][T28714] Call Trace: [ 264.044296][T28714] [ 264.047247][T28714] __dump_stack+0x21/0x24 [ 264.051634][T28714] dump_stack_lvl+0xee/0x150 [ 264.056260][T28714] ? __cfi_dump_stack_lvl+0x8/0x8 [ 264.061322][T28714] dump_stack+0x15/0x24 [ 264.065500][T28714] should_fail_ex+0x3d4/0x520 [ 264.070208][T28714] __should_failslab+0xac/0xf0 [ 264.074997][T28714] should_failslab+0x9/0x20 [ 264.079519][T28714] kmem_cache_alloc_node+0x42/0x340 [ 264.084761][T28714] ? __alloc_skb+0xea/0x4b0 [ 264.089294][T28714] __alloc_skb+0xea/0x4b0 [ 264.093662][T28714] ? __fib6_drop_pcpu_from+0x28b/0x2b0 [ 264.099148][T28714] inet6_rt_notify+0x2a2/0x470 [ 264.103934][T28714] ? __kasan_check_read+0x11/0x20 [ 264.108999][T28714] ? fib6_purge_rt+0x5b5/0x630 [ 264.113791][T28714] ? atomic_notifier_call_chain+0x108/0x120 [ 264.119715][T28714] ? __cfi_inet6_rt_notify+0x10/0x10 [ 264.125044][T28714] ? call_fib_notifiers+0xa0/0xc0 [ 264.130100][T28714] fib6_del+0xbdd/0xf50 [ 264.134292][T28714] ? __cfi_fib6_del+0x10/0x10 [ 264.138991][T28714] ? __kasan_check_write+0x14/0x20 [ 264.144136][T28714] ? finish_task_switch+0x209/0x7b0 [ 264.149374][T28714] ? __switch_to_asm+0x3a/0x60 [ 264.154171][T28714] ? fib6_ifdown+0x2eb/0x4e0 [ 264.158801][T28714] fib6_clean_node+0x2a4/0x530 [ 264.163606][T28714] ? __cfi_fib6_clean_node+0x10/0x10 [ 264.168929][T28714] ? __kasan_check_read+0x11/0x20 [ 264.174007][T28714] fib6_walk_continue+0x50e/0x710 [ 264.179076][T28714] fib6_walk+0x153/0x290 [ 264.183357][T28714] fib6_clean_all+0x16a/0x230 [ 264.188076][T28714] ? tracing_record_taskinfo_sched_switch+0x80/0x3a0 [ 264.194880][T28714] ? probe_sched_wakeup+0x5e/0x90 [ 264.199942][T28714] ? __cfi_fib6_ifdown+0x10/0x10 [ 264.204911][T28714] ? __cfi_fib6_clean_all+0x10/0x10 [ 264.210139][T28714] ? __cfi_fib6_clean_node+0x10/0x10 [ 264.215449][T28714] ? __cfi_fib6_ifdown+0x10/0x10 [ 264.220420][T28714] ? __cfi_preempt_schedule+0x10/0x10 [ 264.225819][T28714] ? try_to_wake_up+0x613/0x1220 [ 264.230791][T28714] rt6_disable_ip+0x11b/0x8f0 [ 264.235514][T28714] ? preempt_schedule_thunk+0x16/0x18 [ 264.240954][T28714] ? __queue_work+0x9df/0xd30 [ 264.245659][T28714] ? __cfi_rt6_disable_ip+0x10/0x10 [ 264.250889][T28714] ? __kasan_check_read+0x11/0x20 [ 264.255955][T28714] addrconf_ifdown+0x15d/0x1910 [ 264.260872][T28714] ? __fput+0x1fc/0x8f0 [ 264.265053][T28714] ? ____fput+0x15/0x20 [ 264.269235][T28714] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 264.275336][T28714] ? __kasan_kmalloc+0x95/0xb0 [ 264.280161][T28714] ? addrconf_cleanup+0x130/0x130 [ 264.285217][T28714] ? __kasan_check_write+0x14/0x20 [ 264.290360][T28714] ? mutex_unlock+0x89/0x220 [ 264.294979][T28714] ? __cfi_mutex_unlock+0x10/0x10 [ 264.300033][T28714] ? __cfi_device_cmp+0x10/0x10 [ 264.304918][T28714] ? masq_device_event+0xd0/0xd0 [ 264.309884][T28714] addrconf_notify+0x39f/0xe40 [ 264.314770][T28714] ? ip6mr_device_event+0x1e0/0x200 [ 264.320001][T28714] raw_notifier_call_chain+0xa1/0x110 [ 264.325407][T28714] dev_close_many+0x32d/0x4d0 [ 264.330106][T28714] ? __kernel_text_address+0xd/0x30 [ 264.335339][T28714] ? __cfi_dev_close_many+0x10/0x10 [ 264.340568][T28714] ? __kasan_check_read+0x11/0x20 [ 264.345625][T28714] unregister_netdevice_many+0x439/0x1820 [ 264.351377][T28714] ? __stack_depot_save+0x36/0x480 [ 264.356514][T28714] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 264.362429][T28714] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 264.368608][T28714] ? ref_tracker_alloc+0x2a5/0x430 [ 264.373742][T28714] ? __kasan_check_write+0x14/0x20 [ 264.378884][T28714] ? queue_delayed_work_on+0x101/0x150 [ 264.384374][T28714] ? linkwatch_fire_event+0x1d2/0x240 [ 264.389771][T28714] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 264.395606][T28714] ? exit_to_user_mode_loop+0x9b/0xb0 [ 264.401018][T28714] ? __kasan_check_read+0x11/0x20 [ 264.406080][T28714] unregister_netdevice_queue+0x31c/0x360 [ 264.412111][T28714] ? linkwatch_schedule_work+0x161/0x190 [ 264.417780][T28714] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 264.424139][T28714] ? linkwatch_fire_event+0x1ed/0x240 [ 264.429544][T28714] __tun_detach+0xca6/0x1460 [ 264.434165][T28714] tun_chr_close+0x92/0x140 [ 264.438686][T28714] ? __cfi_tun_chr_close+0x10/0x10 [ 264.443812][T28714] __fput+0x1fc/0x8f0 [ 264.447821][T28714] ____fput+0x15/0x20 [ 264.451828][T28714] task_work_run+0x1db/0x240 [ 264.456444][T28714] ? __cfi_task_work_run+0x10/0x10 [ 264.461582][T28714] ? filp_close+0x111/0x160 [ 264.466107][T28714] exit_to_user_mode_loop+0x9b/0xb0 [ 264.471331][T28714] exit_to_user_mode_prepare+0x5a/0xa0 [ 264.476807][T28714] syscall_exit_to_user_mode+0x1a/0x30 [ 264.482287][T28714] do_syscall_64+0x58/0xa0 [ 264.486727][T28714] ? clear_bhb_loop+0x30/0x80 [ 264.491423][T28714] ? clear_bhb_loop+0x30/0x80 [ 264.496117][T28714] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 264.502030][T28714] RIP: 0033:0x7fc25c78ebe9 [ 264.506463][T28714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 264.526172][T28714] RSP: 002b:00007fc25d5e5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 264.534615][T28714] RAX: 0000000000000000 RBX: 00007fc25c9c5fa0 RCX: 00007fc25c78ebe9 [ 264.542606][T28714] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 264.550583][T28714] RBP: 00007fc25d5e5090 R08: 0000000000000000 R09: 0000000000000000 [ 264.558553][T28714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 264.566523][T28714] R13: 00007fc25c9c6038 R14: 00007fc25c9c5fa0 R15: 00007ffd490dfd08 [ 264.574501][T28714] [ 264.781547][T28732] device pim6reg1 entered promiscuous mode [ 264.906902][T28750] syz.0.2530[28750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.907006][T28750] syz.0.2530[28750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.014223][T28756] device veth0_vlan left promiscuous mode [ 265.038523][T28756] device veth0_vlan entered promiscuous mode [ 265.103296][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.119406][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.127889][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿþ€: link becomes ready [ 265.543446][T28796] device pim6reg1 entered promiscuous mode [ 265.696144][ T28] audit: type=1400 audit(1757028599.927:159): avc: denied { create } for pid=28797 comm="syz.1.2542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 266.049559][ T28] audit: type=1400 audit(1757028600.277:160): avc: denied { create } for pid=28821 comm="syz.1.2549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 266.572548][T28840] device pim6reg1 entered promiscuous mode [ 269.616189][T28930] device sit0 entered promiscuous mode [ 269.841129][T28940] device pim6reg1 left promiscuous mode [ 271.258906][T28986] device pim6reg1 entered promiscuous mode [ 273.096013][T29026] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.103286][T29026] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.186946][T29026] device bridge_slave_1 left promiscuous mode [ 273.197935][T29026] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.226417][T29026] device bridge_slave_0 left promiscuous mode [ 273.234147][T29026] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.643488][T29055] device pim6reg1 entered promiscuous mode [ 277.075972][T29104] device veth1_to_bond entered promiscuous mode [ 278.291551][T29142] device pim6reg1 entered promiscuous mode [ 279.421521][T29186] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 279.504958][T29193] device pim6reg1 entered promiscuous mode [ 281.917129][T29276] device sit0 left promiscuous mode [ 281.975062][T29278] device sit0 entered promiscuous mode [ 282.246520][ T28] audit: type=1400 audit(1757028616.477:161): avc: denied { mounton } for pid=29282 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 282.686890][ T3389] device veth1_macvtap left promiscuous mode [ 282.889206][T29297] device pim6reg1 entered promiscuous mode [ 282.919817][T29282] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.927155][T29282] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.938342][T29282] device bridge_slave_0 entered promiscuous mode [ 282.952154][T29282] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.978564][T29282] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.039128][T29282] device bridge_slave_1 entered promiscuous mode [ 283.573001][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.580618][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.651617][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.695059][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.757888][ T3382] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.765017][ T3382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.811679][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.820183][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.828484][ T3382] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.835547][ T3382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.843010][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 283.850971][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 283.910336][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.946029][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 283.955586][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.004687][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 284.013343][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.022006][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.030057][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.076371][T29282] device veth0_vlan entered promiscuous mode [ 284.160713][T29364] device pim6reg1 entered promiscuous mode [ 284.224005][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.235592][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.255958][T29282] device veth1_macvtap entered promiscuous mode [ 284.277859][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.288835][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.319480][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.360425][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 284.384465][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 284.429714][ T28] audit: type=1400 audit(1757028618.657:162): avc: denied { unmount } for pid=29282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 285.399505][T29402] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.432623][T29402] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.453587][T29402] device bridge_slave_0 entered promiscuous mode [ 285.491755][T29402] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.512191][T29402] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.526688][T29402] device bridge_slave_1 entered promiscuous mode [ 286.075953][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 286.103216][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 286.156834][T29402] device veth0_vlan entered promiscuous mode [ 286.179350][T29402] device veth1_macvtap entered promiscuous mode [ 286.208249][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 286.221419][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 286.230152][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.237246][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.251053][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 286.260119][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.270328][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.277415][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.292324][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 286.307609][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.315963][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 286.324192][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.332339][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.341255][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.350065][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 286.358133][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.366421][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 286.374726][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 286.383139][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.417092][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 286.425220][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.432858][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.519964][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.528936][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.537578][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 286.546363][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 287.955815][ T3389] device bridge_slave_1 left promiscuous mode [ 287.974125][ T3389] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.982668][ T3389] device bridge_slave_0 left promiscuous mode [ 287.988936][ T3389] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.997443][ T3389] device veth1_macvtap left promiscuous mode [ 288.004170][ T3389] device veth0_vlan left promiscuous mode [ 288.742333][T29474] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.749571][T29474] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.758367][T29474] device bridge_slave_0 entered promiscuous mode [ 288.813320][T29474] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.820416][T29474] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.839248][T29474] device bridge_slave_1 entered promiscuous mode [ 289.436420][ T3389] device bridge_slave_1 left promiscuous mode [ 289.453088][ T3389] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.493748][ T3389] device bridge_slave_0 left promiscuous mode [ 289.499950][ T3389] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.508599][ T3389] device veth1_macvtap left promiscuous mode [ 289.514756][ T3389] device veth0_vlan left promiscuous mode [ 289.890498][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 289.898173][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 289.906886][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.915856][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.924397][ T3382] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.931497][ T3382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.939361][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 289.948127][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.956694][ T3382] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.963770][ T3382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.971520][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.006781][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.016808][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.065691][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 290.116060][T29506] device pim6reg1 entered promiscuous mode [ 290.134411][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.152984][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.160737][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 290.187672][T29474] device veth0_vlan entered promiscuous mode [ 290.229859][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 290.238857][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.264314][T29474] device veth1_macvtap entered promiscuous mode [ 290.287033][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 290.326662][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 290.356806][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 290.476467][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 290.493216][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 291.503005][T29542] device pim6reg1 left promiscuous mode [ 292.166076][T29546] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.177114][T29546] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.189267][T29546] device bridge_slave_0 entered promiscuous mode [ 292.249264][T29546] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.257110][T29546] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.264804][T29546] device bridge_slave_1 entered promiscuous mode [ 292.853464][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.871395][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.899289][ T3389] device bridge_slave_1 left promiscuous mode [ 292.917974][ T3389] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.974347][ T3389] device bridge_slave_0 left promiscuous mode [ 293.040762][ T3389] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.078497][ T3389] device veth1_macvtap left promiscuous mode [ 293.096979][ T3389] device veth0_vlan left promiscuous mode [ 293.329175][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.345458][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.363658][ T3382] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.370790][ T3382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.393520][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.410818][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.428777][ T3382] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.435919][ T3382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.458707][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.475662][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.492604][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.530966][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 293.546198][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.609507][T29546] device veth0_vlan entered promiscuous mode [ 293.626344][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 293.641272][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.757789][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.773134][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.781230][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 293.793295][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 293.835950][T29546] device veth1_macvtap entered promiscuous mode [ 293.908814][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 293.917539][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 293.926397][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.960928][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 293.982270][ T3386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.752187][T29646] device pim6reg1 entered promiscuous mode [ 295.492927][T29659] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.544069][T29659] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.552579][T29659] device bridge_slave_0 entered promiscuous mode [ 295.577404][T29659] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.599178][T29659] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.613862][T29659] device bridge_slave_1 entered promiscuous mode [ 295.810580][T29685] device pim6reg1 left promiscuous mode [ 296.244181][ T3389] device bridge_slave_1 left promiscuous mode [ 296.260799][ T3389] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.343212][ T3389] device bridge_slave_0 left promiscuous mode [ 296.359781][ T3389] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.405038][ T3389] device veth1_macvtap left promiscuous mode [ 296.413089][ T3389] device veth0_vlan left promiscuous mode [ 296.845775][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 296.865162][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.961871][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 296.983572][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.047305][ T3382] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.054426][ T3382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.134891][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.179860][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.260863][ T3382] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.268007][ T3382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.311027][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 297.400264][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 297.418720][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 297.595457][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 297.632166][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 297.717069][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 297.726697][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 297.782074][T29659] device veth0_vlan entered promiscuous mode [ 297.822433][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 297.836268][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.888742][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.912041][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.036974][T29659] device veth1_macvtap entered promiscuous mode [ 298.053547][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 298.067072][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 298.113287][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 298.180995][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 298.213307][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 298.224386][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 298.233050][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 298.519812][T29751] device pim6reg1 entered promiscuous mode [ 299.183682][ T3389] device bridge_slave_1 left promiscuous mode [ 299.189863][ T3389] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.197467][ T3389] device bridge_slave_0 left promiscuous mode [ 299.203703][ T3389] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.211683][ T3389] device veth1_macvtap left promiscuous mode [ 299.217915][ T3389] device veth0_vlan left promiscuous mode [ 299.584175][T29767] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.592442][T29767] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.606444][T29767] device bridge_slave_0 entered promiscuous mode [ 299.614167][T29767] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.621232][T29767] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.630694][T29767] device bridge_slave_1 entered promiscuous mode [ 300.496052][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 300.523913][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.574632][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 300.614552][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.662921][ T3389] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.670059][ T3389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.741399][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 300.785300][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.838670][ T3389] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.845800][ T3389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.892958][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 300.924113][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 300.937067][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 300.952112][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 300.967037][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 300.996633][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 301.010292][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 301.023917][T29767] device veth0_vlan entered promiscuous mode [ 301.031101][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 301.039505][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.074337][T29767] device veth1_macvtap entered promiscuous mode [ 301.082973][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 301.093557][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 301.121403][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 301.130541][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 301.139020][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 301.204318][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 301.224356][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 301.233158][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 301.241871][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 302.118054][ T3382] device bridge_slave_1 left promiscuous mode [ 302.124367][ T3382] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.132138][ T3382] device bridge_slave_0 left promiscuous mode [ 302.138736][ T3382] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.147354][ T3382] device veth1_macvtap left promiscuous mode [ 302.153574][ T3382] device veth0_vlan left promiscuous mode [ 303.257832][T29886] device pim6reg1 entered promiscuous mode [ 303.325744][T29875] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.344202][T29875] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.353427][T29875] device bridge_slave_0 entered promiscuous mode [ 303.376742][T29875] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.405642][T29875] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.457056][T29875] device bridge_slave_1 entered promiscuous mode [ 303.487841][T29894] device pim6reg1 entered promiscuous mode [ 304.252693][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 304.276649][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.336344][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.355325][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.371425][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.378556][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.410707][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.420038][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.428455][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.435557][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.444271][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.452483][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.482925][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 304.497152][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.506390][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.540159][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 304.548982][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 304.604707][T29875] device veth0_vlan entered promiscuous mode [ 304.611074][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 304.626366][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.635583][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 304.643515][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.744581][T29938] device sit0 entered promiscuous mode [ 305.201830][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 305.210424][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 305.220436][T29875] device veth1_macvtap entered promiscuous mode [ 305.237115][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 305.245336][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 305.253750][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 305.277963][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 305.286992][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 306.253427][ T3382] device bridge_slave_1 left promiscuous mode [ 306.259588][ T3382] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.267286][ T3382] device bridge_slave_0 left promiscuous mode [ 306.273484][ T3382] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.281505][ T3382] device veth1_macvtap left promiscuous mode [ 306.288110][ T3382] device veth0_vlan left promiscuous mode [ 306.602102][T29982] syz.4.2847[29982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.602182][T29982] syz.4.2847[29982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.166091][T29987] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.326096][T29987] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.334050][T29987] device bridge_slave_0 entered promiscuous mode [ 307.341358][T29987] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.348475][T29987] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.356054][T29987] device bridge_slave_1 entered promiscuous mode [ 308.187114][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 308.210872][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 308.430691][T30036] device sit0 left promiscuous mode [ 308.494784][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 308.504225][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.513636][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.520768][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.532276][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 308.541306][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.550162][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.557273][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.567225][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 308.575924][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 308.591577][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 308.605047][T30034] device pim6reg1 entered promiscuous mode [ 308.611808][T30031] device sit0 entered promiscuous mode [ 308.775977][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 308.803346][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 308.851789][T30040] device pim6reg1 left promiscuous mode [ 308.895767][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 308.913747][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.024185][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.038462][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 309.047591][T29987] device veth0_vlan entered promiscuous mode [ 309.140440][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 309.193222][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 309.300987][T29987] device veth1_macvtap entered promiscuous mode [ 309.325267][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 309.355174][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 309.458947][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 309.537741][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 309.596575][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 310.243690][ T3382] device bridge_slave_1 left promiscuous mode [ 310.249914][ T3382] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.257830][ T3382] device bridge_slave_0 left promiscuous mode [ 310.264068][ T3382] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.272420][ T3382] device veth1_macvtap left promiscuous mode [ 310.278777][ T3382] device veth0_vlan left promiscuous mode [ 312.340673][T30091] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.406358][T30091] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.455803][T30091] device bridge_slave_0 entered promiscuous mode [ 312.516284][T30091] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.575033][T30091] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.650915][T30091] device bridge_slave_1 entered promiscuous mode [ 313.228570][T30131] device syzkaller0 entered promiscuous mode [ 313.871724][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.879431][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.921926][T30160] device pim6reg1 entered promiscuous mode [ 313.929863][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 313.963637][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.011409][ T3382] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.018637][ T3382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.091525][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 314.611669][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 314.630461][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.639610][ T3382] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.646733][ T3382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.661085][T30176] device wg2 left promiscuous mode [ 314.671326][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 314.679674][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.691996][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 314.700472][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.712966][T30176] device wg2 entered promiscuous mode [ 314.743365][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 314.758446][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.781476][T30091] device veth0_vlan entered promiscuous mode [ 314.820810][T30186] FAULT_INJECTION: forcing a failure. [ 314.820810][T30186] name failslab, interval 1, probability 0, space 0, times 0 [ 314.855799][T30091] device veth1_macvtap entered promiscuous mode [ 314.882854][T30186] CPU: 1 PID: 30186 Comm: syz.1.2899 Tainted: G W syzkaller #0 [ 314.891876][T30186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 314.902123][T30186] Call Trace: [ 314.905408][T30186] [ 314.908343][T30186] __dump_stack+0x21/0x24 [ 314.912678][T30186] dump_stack_lvl+0xee/0x150 [ 314.917281][T30186] ? __cfi_dump_stack_lvl+0x8/0x8 [ 314.922316][T30186] dump_stack+0x15/0x24 [ 314.926487][T30186] should_fail_ex+0x3d4/0x520 [ 314.931172][T30186] __should_failslab+0xac/0xf0 [ 314.935958][T30186] ? call_usermodehelper_setup+0x8e/0x210 [ 314.941861][T30186] should_failslab+0x9/0x20 [ 314.946384][T30186] __kmem_cache_alloc_node+0x3d/0x2c0 [ 314.951765][T30186] ? call_usermodehelper_setup+0x8e/0x210 [ 314.957505][T30186] kmalloc_trace+0x29/0xb0 [ 314.961956][T30186] call_usermodehelper_setup+0x8e/0x210 [ 314.967516][T30186] ? __cfi_free_modprobe_argv+0x10/0x10 [ 314.973066][T30186] __request_module+0x35d/0x890 [ 314.977916][T30186] ? __cfi___request_module+0x10/0x10 [ 314.983299][T30186] ? cap_capable+0x1aa/0x230 [ 314.987895][T30186] ? security_capable+0x99/0xc0 [ 314.992759][T30186] dev_load+0x5b/0xb0 [ 314.996751][T30186] dev_ioctl+0x53f/0xd10 [ 315.000997][T30186] sock_do_ioctl+0x23f/0x310 [ 315.005596][T30186] ? sock_show_fdinfo+0xb0/0xb0 [ 315.010452][T30186] ? selinux_file_ioctl+0x377/0x480 [ 315.015647][T30186] sock_ioctl+0x4d8/0x6e0 [ 315.019978][T30186] ? __cfi_sock_ioctl+0x10/0x10 [ 315.024829][T30186] ? __fget_files+0x2d5/0x330 [ 315.029513][T30186] ? security_file_ioctl+0x95/0xc0 [ 315.034640][T30186] ? __cfi_sock_ioctl+0x10/0x10 [ 315.039497][T30186] __se_sys_ioctl+0x12f/0x1b0 [ 315.044189][T30186] __x64_sys_ioctl+0x7b/0x90 [ 315.048792][T30186] x64_sys_call+0x58b/0x9a0 [ 315.053364][T30186] do_syscall_64+0x4c/0xa0 [ 315.057784][T30186] ? clear_bhb_loop+0x30/0x80 [ 315.062468][T30186] ? clear_bhb_loop+0x30/0x80 [ 315.067150][T30186] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 315.073046][T30186] RIP: 0033:0x7fc25c78ebe9 [ 315.077459][T30186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 315.097085][T30186] RSP: 002b:00007fc25d5c4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 315.105501][T30186] RAX: ffffffffffffffda RBX: 00007fc25c9c6090 RCX: 00007fc25c78ebe9 [ 315.113472][T30186] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 315.121447][T30186] RBP: 00007fc25d5c4090 R08: 0000000000000000 R09: 0000000000000000 [ 315.129418][T30186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 315.137477][T30186] R13: 00007fc25c9c6128 R14: 00007fc25c9c6090 R15: 00007ffd490dfd08 [ 315.145463][T30186] [ 315.155089][ T28] audit: type=1400 audit(1757028649.387:163): avc: denied { sys_module } for pid=30180 comm="syz.1.2899" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 315.193288][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 315.212350][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.220813][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 315.229427][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 315.237793][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 315.245913][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.253764][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.291930][T30186] device pim6reg1 entered promiscuous mode [ 315.343383][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 315.354801][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 315.363597][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 315.372039][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 316.243478][ T3389] device bridge_slave_1 left promiscuous mode [ 316.253272][ T3389] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.279400][ T3389] device bridge_slave_0 left promiscuous mode [ 316.301231][ T3389] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.340213][ T3389] device veth1_macvtap left promiscuous mode [ 316.346534][ T3389] device veth0_vlan left promiscuous mode [ 316.899270][T30210] device pim6reg1 entered promiscuous mode [ 317.751071][T30230] device pim6reg1 entered promiscuous mode [ 317.798460][T30238] FAULT_INJECTION: forcing a failure. [ 317.798460][T30238] name failslab, interval 1, probability 0, space 0, times 0 [ 317.825326][T30238] CPU: 0 PID: 30238 Comm: syz.1.2915 Tainted: G W syzkaller #0 [ 317.834321][T30238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 317.844414][T30238] Call Trace: [ 317.847719][T30238] [ 317.850670][T30238] __dump_stack+0x21/0x24 [ 317.855030][T30238] dump_stack_lvl+0xee/0x150 [ 317.859645][T30238] ? __cfi_dump_stack_lvl+0x8/0x8 [ 317.864791][T30238] dump_stack+0x15/0x24 [ 317.868968][T30238] should_fail_ex+0x3d4/0x520 [ 317.873678][T30238] __should_failslab+0xac/0xf0 [ 317.878486][T30238] ? kvmalloc_node+0x294/0x480 [ 317.883292][T30238] should_failslab+0x9/0x20 [ 317.887806][T30238] __kmem_cache_alloc_node+0x3d/0x2c0 [ 317.893203][T30238] ? kasan_save_alloc_info+0x25/0x30 [ 317.898517][T30238] ? kvmalloc_node+0x294/0x480 [ 317.903290][T30238] __kmalloc_node+0xa1/0x1e0 [ 317.907888][T30238] ? dev_activate+0x2cf/0x1040 [ 317.912674][T30238] ? __dev_change_flags+0x21b/0x6b0 [ 317.917879][T30238] kvmalloc_node+0x294/0x480 [ 317.922475][T30238] ? x64_sys_call+0x58b/0x9a0 [ 317.927157][T30238] ? do_syscall_64+0x4c/0xa0 [ 317.931745][T30238] ? __cfi_kvmalloc_node+0x10/0x10 [ 317.936881][T30238] ? __kasan_check_write+0x14/0x20 [ 317.942003][T30238] ? qdisc_alloc+0x5ae/0x780 [ 317.946595][T30238] pfifo_fast_init+0x3af/0x7a0 [ 317.951364][T30238] qdisc_create_dflt+0x150/0x3b0 [ 317.956303][T30238] dev_activate+0x2cf/0x1040 [ 317.960900][T30238] __dev_open+0x3ce/0x4f0 [ 317.965232][T30238] ? dev_open+0x230/0x230 [ 317.969568][T30238] ? _raw_spin_unlock_bh+0x50/0x60 [ 317.974695][T30238] ? dev_set_rx_mode+0x223/0x2c0 [ 317.979650][T30238] ? __kasan_check_read+0x11/0x20 [ 317.984687][T30238] __dev_change_flags+0x21b/0x6b0 [ 317.989720][T30238] ? __cfi___dev_change_flags+0x10/0x10 [ 317.995275][T30238] dev_change_flags+0x88/0x1a0 [ 318.000049][T30238] dev_ifsioc+0x159/0xed0 [ 318.004387][T30238] ? dev_ioctl+0xd10/0xd10 [ 318.008807][T30238] ? __mutex_lock_slowpath+0xe/0x10 [ 318.014011][T30238] ? mutex_lock+0xf8/0x1a0 [ 318.018432][T30238] ? __cfi_mutex_lock+0x10/0x10 [ 318.023301][T30238] ? dev_get_by_name_rcu+0xe5/0x130 [ 318.028509][T30238] dev_ioctl+0x556/0xd10 [ 318.032784][T30238] sock_do_ioctl+0x23f/0x310 [ 318.037391][T30238] ? sock_show_fdinfo+0xb0/0xb0 [ 318.042248][T30238] ? selinux_file_ioctl+0x377/0x480 [ 318.047454][T30238] sock_ioctl+0x4d8/0x6e0 [ 318.051792][T30238] ? __cfi_sock_ioctl+0x10/0x10 [ 318.056646][T30238] ? __fget_files+0x2d5/0x330 [ 318.061335][T30238] ? security_file_ioctl+0x95/0xc0 [ 318.066450][T30238] ? __cfi_sock_ioctl+0x10/0x10 [ 318.071307][T30238] __se_sys_ioctl+0x12f/0x1b0 [ 318.075995][T30238] __x64_sys_ioctl+0x7b/0x90 [ 318.080592][T30238] x64_sys_call+0x58b/0x9a0 [ 318.085105][T30238] do_syscall_64+0x4c/0xa0 [ 318.089542][T30238] ? clear_bhb_loop+0x30/0x80 [ 318.094228][T30238] ? clear_bhb_loop+0x30/0x80 [ 318.098909][T30238] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 318.104815][T30238] RIP: 0033:0x7fc25c78ebe9 [ 318.109245][T30238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.128847][T30238] RSP: 002b:00007fc25d5e5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 318.137261][T30238] RAX: ffffffffffffffda RBX: 00007fc25c9c5fa0 RCX: 00007fc25c78ebe9 [ 318.145240][T30238] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 318.153238][T30238] RBP: 00007fc25d5e5090 R08: 0000000000000000 R09: 0000000000000000 [ 318.161228][T30238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.169209][T30238] R13: 00007fc25c9c6038 R14: 00007fc25c9c5fa0 R15: 00007ffd490dfd08 [ 318.177206][T30238] [ 318.193655][T30238] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 318.201559][T30238] device pim6reg1 entered promiscuous mode [ 318.209318][T30217] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.218712][T30217] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.227450][T30217] device bridge_slave_0 entered promiscuous mode [ 318.236352][T30217] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.244235][T30217] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.252724][T30217] device bridge_slave_1 entered promiscuous mode [ 318.565749][T30217] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.572872][T30217] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.580174][T30217] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.587256][T30217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.725265][ T3389] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.734924][ T3389] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.793663][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 318.803326][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 318.873739][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 318.886125][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 318.895699][ T3389] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.902837][ T3389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.911906][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 318.920654][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 318.929253][ T3389] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.936353][ T3389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.974994][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 318.983891][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 318.992114][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 319.000897][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 319.044524][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 319.088337][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 319.126990][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 319.146862][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 319.156913][T30217] device veth0_vlan entered promiscuous mode [ 319.185279][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 319.193362][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 319.278608][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 319.313501][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 319.378862][T30273] device veth1_macvtap left promiscuous mode [ 319.435783][T30273] device macsec0 left promiscuous mode [ 319.664236][T30217] device veth1_macvtap entered promiscuous mode [ 319.700961][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 319.721724][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 319.799489][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 319.926140][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 319.970390][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 321.193438][ T3374] device bridge_slave_1 left promiscuous mode [ 321.199659][ T3374] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.207446][ T3374] device bridge_slave_0 left promiscuous mode [ 321.213634][ T3374] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.221631][ T3374] device veth1_macvtap left promiscuous mode [ 321.227780][ T3374] device veth0_vlan left promiscuous mode [ 321.445481][T30324] device sit0 left promiscuous mode [ 322.046970][T30349] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.074562][T30349] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.082192][T30349] device bridge_slave_0 entered promiscuous mode [ 322.089364][T30349] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.096456][T30349] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.103990][T30349] device bridge_slave_1 entered promiscuous mode [ 322.700699][T30349] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.707820][T30349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.715156][T30349] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.722210][T30349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.854220][T30391] device sit0 entered promiscuous mode [ 322.910421][T30397] syz.1.2954[30397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.910534][T30397] syz.1.2954[30397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.055227][ T28] audit: type=1400 audit(1757028657.287:164): avc: denied { create } for pid=30395 comm="syz.1.2954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 323.086622][ T3382] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.104467][ T3382] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.136475][T30405] syz.1.2957[30405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.136588][T30405] syz.1.2957[30405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.152467][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 323.181827][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 323.289031][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 323.336054][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 323.394664][ T3382] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.401783][ T3382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.460121][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 323.476837][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.485508][ T3382] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.492610][ T3382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.500483][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 323.509067][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.517489][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 323.526146][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 323.754931][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 323.765696][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 323.880919][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 323.891300][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 323.937834][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 323.967230][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 324.023726][T30349] device veth0_vlan entered promiscuous mode [ 324.069354][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 324.081071][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.185960][T30349] device veth1_macvtap entered promiscuous mode [ 324.281230][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 324.289857][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 324.373979][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 324.382598][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 325.403707][ T3374] device bridge_slave_1 left promiscuous mode [ 325.409849][ T3374] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.417500][ T3374] device bridge_slave_0 left promiscuous mode [ 325.423715][ T3374] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.431807][ T3374] device veth1_macvtap left promiscuous mode [ 325.437984][ T3374] device veth0_vlan left promiscuous mode [ 326.143593][T30441] device pim6reg1 entered promiscuous mode [ 326.703776][T30442] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.737511][T30442] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.750286][T30442] device bridge_slave_0 entered promiscuous mode [ 328.010073][T30442] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.017896][T30442] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.027665][T30442] device bridge_slave_1 entered promiscuous mode [ 328.456262][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 328.476272][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 328.487290][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 328.496514][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 328.505224][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.512412][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.520582][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 328.532381][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 328.541004][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.548087][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.556127][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.598902][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 328.607624][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 328.641106][T30442] device veth0_vlan entered promiscuous mode [ 328.650630][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 328.659325][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 328.669563][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 328.677221][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 328.836844][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 328.943375][T30515] device veth1_macvtap left promiscuous mode [ 328.950348][T30515] device macsec0 left promiscuous mode [ 328.980151][T30511] device pim6reg1 entered promiscuous mode [ 329.029017][T30516] device veth1_macvtap entered promiscuous mode [ 329.041057][T30516] device macsec0 entered promiscuous mode [ 329.135765][T30442] device veth1_macvtap entered promiscuous mode [ 329.304633][T30524] tap0: tun_chr_ioctl cmd 1074025677 [ 329.333033][T30524] tap0: linktype set to 776 [ 329.356225][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 329.365203][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 329.391059][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 329.410272][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 329.624034][T30536] syz.0.2987[30536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.624116][T30536] syz.0.2987[30536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.783645][ T3389] device bridge_slave_1 left promiscuous mode [ 330.801248][ T3389] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.808917][ T3389] device bridge_slave_0 left promiscuous mode [ 330.815212][ T3389] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.823464][ T3389] device veth1_macvtap left promiscuous mode [ 330.829494][ T3389] device veth0_vlan left promiscuous mode [ 331.263692][T30545] device syzkaller0 entered promiscuous mode [ 331.658968][T30565] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.678624][T30565] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.693730][T30565] device bridge_slave_0 entered promiscuous mode [ 331.725174][T30565] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.732501][T30565] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.740455][T30565] device bridge_slave_1 entered promiscuous mode [ 332.450488][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 332.458700][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.466517][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.475784][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.484472][ T3382] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.491558][ T3382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.499516][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.508260][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.516539][ T3382] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.523598][ T3382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.555404][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 332.563380][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.571566][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.604181][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.612424][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.679849][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 332.690790][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 332.707072][T30565] device veth0_vlan entered promiscuous mode [ 332.753368][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 332.784825][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.793216][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.801092][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 332.961085][T30565] device veth1_macvtap entered promiscuous mode [ 332.995053][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.053610][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 333.071295][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 333.082384][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 333.091375][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 333.843832][ T3389] device bridge_slave_1 left promiscuous mode [ 333.850224][ T3389] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.857885][ T3389] device bridge_slave_0 left promiscuous mode [ 333.864114][ T3389] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.872101][ T3389] device veth1_macvtap left promiscuous mode [ 333.878203][ T3389] device veth0_vlan left promiscuous mode [ 334.889802][T30657] device veth0_vlan left promiscuous mode [ 334.896111][T30657] device veth0_vlan entered promiscuous mode [ 334.916639][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.937018][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 334.990312][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿþ€: link becomes ready [ 335.498410][T30659] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.506343][T30659] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.513973][T30659] device bridge_slave_0 entered promiscuous mode [ 335.584634][T30659] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.591747][T30659] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.656631][T30659] device bridge_slave_1 entered promiscuous mode [ 336.247143][T30659] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.254273][T30659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.261630][T30659] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.268712][T30659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.313283][T30718] device pim6reg1 entered promiscuous mode [ 336.411100][ T3382] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.422670][ T3382] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.531400][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.550214][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.644588][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.665505][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.689908][ T3382] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.697127][ T3382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.733891][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.760512][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.771557][ T3382] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.778665][ T3382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.888504][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 336.899626][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.919738][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 336.930407][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.962194][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 336.979894][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 337.171622][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 337.193078][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.228645][T30659] device veth0_vlan entered promiscuous mode [ 337.376513][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.390913][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 337.437238][T30659] device veth1_macvtap entered promiscuous mode [ 337.449414][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 337.464577][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 337.480107][ T3382] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 337.518240][T30761] device sit0 left promiscuous mode [ 337.612875][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 337.629961][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 337.655579][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 337.690836][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 337.754924][T30773] device wg2 entered promiscuous mode [ 339.223513][ T3389] device bridge_slave_1 left promiscuous mode [ 339.229698][ T3389] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.237249][ T3389] device bridge_slave_0 left promiscuous mode [ 339.243502][ T3389] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.251498][ T3389] device veth1_macvtap left promiscuous mode [ 339.257600][ T3389] device veth0_vlan left promiscuous mode [ 339.889479][T30791] device wg2 left promiscuous mode [ 339.929670][T30785] device wg2 entered promiscuous mode [ 340.174169][T30795] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.193162][T30795] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.206228][T30795] device bridge_slave_0 entered promiscuous mode [ 340.315330][T30795] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.322728][T30795] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.330905][T30795] device bridge_slave_1 entered promiscuous mode [ 340.705847][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 340.740278][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.787741][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 340.944905][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.962029][ T3374] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.969215][ T3374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.976830][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 341.007026][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 341.015691][ T3374] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.022785][ T3374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.030606][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 341.046938][T30872] device pim6reg1 entered promiscuous mode [ 341.057124][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 341.074684][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 341.087101][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 341.118987][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 341.129351][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 341.139924][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 341.150078][T30795] device veth0_vlan entered promiscuous mode [ 341.174002][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 341.185523][T30795] device veth1_macvtap entered promiscuous mode [ 341.208366][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 341.220635][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 341.835511][ T3374] device bridge_slave_1 left promiscuous mode [ 341.841731][ T3374] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.893260][ T3374] device bridge_slave_0 left promiscuous mode [ 341.899476][ T3374] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.907869][ T3374] device veth1_macvtap left promiscuous mode [ 341.913972][ T3374] device veth0_vlan left promiscuous mode [ 343.544631][ T3374] device erspan0 left promiscuous mode [ 343.550184][ T3374] syzkaller: port 1(erspan0) entered disabled state [ 343.754276][ T3374] device bridge_slave_1 left promiscuous mode [ 343.762712][ T3374] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.788174][ T3374] device bridge_slave_0 left promiscuous mode [ 343.799795][ T3374] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.733044][T30927] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.740152][T30927] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.748440][T30927] device bridge_slave_0 entered promiscuous mode [ 344.787560][T30927] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.794759][T30927] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.802631][T30927] device bridge_slave_1 entered promiscuous mode [ 344.850972][T30913] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.858308][T30913] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.866106][T30913] device bridge_slave_0 entered promiscuous mode [ 344.873052][T30922] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.880169][T30922] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.887758][T30922] device bridge_slave_0 entered promiscuous mode [ 344.895122][T30922] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.902176][T30922] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.910124][T30922] device bridge_slave_1 entered promiscuous mode [ 344.917129][T30943] device pim6reg1 entered promiscuous mode [ 344.927740][T30913] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.934837][T30913] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.942528][T30913] device bridge_slave_1 entered promiscuous mode [ 345.183218][T30927] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.190362][T30927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.197756][T30927] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.204830][T30927] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.287052][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.294632][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.304675][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 345.312336][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.353581][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.361897][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.368986][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.376773][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.385376][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.392457][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.617610][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.625867][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.741148][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 345.751928][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 345.795711][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 345.813830][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 348.138363][ T28] audit: type=1400 audit(1757028682.367:165): avc: denied { read } for pid=30988 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 349.150201][T30927] device veth0_vlan entered promiscuous mode [ 349.173279][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 349.182206][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 349.196263][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.203386][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.211478][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 349.220016][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 349.228546][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.235824][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.243762][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 349.251399][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 349.259210][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 349.267903][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 349.276471][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.283547][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.291373][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 349.299671][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 349.308175][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 349.316616][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 349.324953][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 349.342132][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 349.350728][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 349.364260][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 349.373117][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.380229][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.387889][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 349.397383][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 349.405869][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 349.415502][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 349.424113][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 349.431818][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready Stopping sshd: [ 349.453405][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 349.463521][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready stopped /usr/sbin/sshd (pid 194) OK [ 349.501267][T30927] device veth1_macvtap entered promiscuous mode Stopping crond: stopped /usr/sbin/crond (pid 187) OK [ 349.541384][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 349.553648][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 349.586266][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 349.600576][T30913] device veth0_vlan entered promiscuous mode Stopping dhcpcd... [ 349.615341][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready stopped /sbin/dh[ 349.624697][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready cpcd (pid 141) [ 349.648571][ T28] audit: type=1400 audit(1757028683.877:166): avc: denied { search } for pid=31008 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 349.652211][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 349.687374][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 349.710938][T30913] device veth1_macvtap entered promiscuous mode [ 349.726175][ T3374] device bridge_slave_1 left promiscuous mode [ 349.743106][ T3374] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.753261][ T3374] device bridge_slave_0 left promiscuous mode [ 349.759443][ T3374] bridge0: port 1(bridge_slave_0) entered disabled state Stopping network: [ 349.989955][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 349.999604][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 350.007607][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 350.016097][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 350.024806][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 350.032676][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 350.041543][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 350.050319][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 350.059231][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 350.068034][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 350.076777][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 350.115685][T30922] device veth0_vlan entered promiscuous mode [ 350.127761][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 350.143855][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.160739][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 350.169926][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 350.181905][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 350.190814][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 350.210242][ T28] audit: type=1400 audit(1757028684.437:167): avc: denied { mount } for pid=30927 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 350.234668][ T28] audit: type=1400 audit(1757028684.437:168): avc: denied { mounton } for pid=30927 comm="syz-executor" path="/root/syzkaller.Pm3Ns2/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 350.266981][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.283382][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 350.309803][T30922] device veth1_macvtap entered promiscuous mode [ 350.349254][T31028] device veth0_vlan left promiscuous mode [ 350.367146][T31028] device veth0_vlan entered promiscuous mode OK [ 350.424367][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready Stopping iptable[ 350.438161][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready s: [ 350.447697][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 350.460024][ T28] audit: type=1400 audit(1757028684.697:169): avc: denied { search } for pid=31037 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK Stopping system message bus: [ 350.502086][ T28] audit: type=1400 audit(1757028684.697:170): avc: denied { write } for pid=31037 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 350.527315][ T28] audit: type=1400 audit(1757028684.697:171): avc: denied { add_name } for pid=31037 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 350.550986][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 350.567490][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 350.593927][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 350.612524][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 350.620877][ T28] audit: type=1400 audit(1757028684.697:172): avc: denied { create } for pid=31037 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 350.662442][ T28] audit: type=1400 audit(1757028684.697:173): avc: denied { read open } for pid=31037 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=10123 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 350.698735][ T28] audit: type=1400 audit(1757028684.697:174): avc: denied { lock } for pid=31037 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=10123 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 done [ 354.265160][ T28] audit: type=1400 audit(1757028688.497:175): avc: denied { write } for pid=142 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping klogd: [ 354.342705][ T28] audit: type=1400 audit(1757028688.497:176): avc: denied { remove_name } for pid=142 comm="dhcpcd" name="sock" dev="tmpfs" ino=491 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 354.438306][T31048] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.452969][ T28] audit: type=1400 audit(1757028688.497:177): avc: denied { unlink } for pid=142 comm="dhcpcd" name="sock" dev="tmpfs" ino=491 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 354.464201][T31048] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.482729][T31048] device bridge_slave_0 entered promiscuous mode [ 354.488702][ T28] audit: type=1400 audit(1757028688.527:178): avc: denied { unlink } for pid=142 comm="dhcpcd" name="pid" dev="tmpfs" ino=490 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 354.510834][ T28] audit: type=1400 audit(1757028688.537:179): avc: denied { module_request } for pid=31048 comm="syz-executor" kmod="rtnl-link-bond" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 354.533825][T31078] device veth0_vlan left promiscuous mode OK [ 354.540435][T31078] device veth0_vlan entered promiscuous mode Stopping acpid: [ 354.564751][T31048] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.575605][ T28] audit: type=1400 audit(1757028688.807:180): avc: denied { write } for pid=88 comm="acpid" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 354.576031][T31048] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.604757][T31048] device bridge_slave_1 entered promiscuous mode [ 354.605201][ T28] audit: type=1400 audit(1757028688.807:181): avc: denied { remove_name } for pid=88 comm="acpid" name="acpid.pid" dev="tmpfs" ino=7 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 354.633754][ T28] audit: type=1400 audit(1757028688.807:182): avc: denied { unlink } for pid=88 comm="acpid" name="acpid.pid" dev="tmpfs" ino=7 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 355.043503][T31048] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.050607][T31048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.057968][T31048] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.065073][T31048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.092110][ T3389] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.109622][ T3389] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.204985][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 355.273700][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.471878][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 355.493167][ T3389] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.500263][ T3389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.569150][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 355.583098][ T3389] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.590179][ T3389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.602911][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready OK Stopping syslogd: [ 355.765019][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 355.783406][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready stopped /sbin/syslogd (pid 85) OK [ 355.875511][T31048] device veth0_vlan entered promiscuous mode [ 355.914876][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 355.930512][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 355.939361][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 355.947504][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 355.990201][T31048] device veth1_macvtap entered promiscuous mode [ 356.053540][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 356.061581][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready umount: can't remount debugfs read-only [ 356.135134][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 356.176100][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 356.203488][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only [ 356.373110][ T3374] device bridge_slave_1 left promiscuous mode [ 356.379302][ T3374] bridge0: port 2(bridge_slave_1) entered disabled state umount: can't remount /dev/root read-only [ 356.397386][ T3374] device bridge_slave_0 left promiscuous mode The system is going down NOW! Connection to 10.128.1.101 closed by remote host. [ 356.422817][ T28] audit: type=1400 audit(1757028690.647:183): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[14657]" dev="pipefs" ino=14657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 Sent SIGTERM to all processes [ 356.473208][ T3374] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.496380][ T3374] device veth1_macvtap left promiscuous mode [ 356.502463][ T3374] device veth0_vlan left promiscuous mode [ 356.644449][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 356.653187][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready Sent SIGKILL to all processes Requesting system poweroff [ 357.817941][ T3374] device erspan0 left promiscuous mode [ 357.823598][ T3374] syzkaller: port 1(erspan0) entered disabled state [ 358.054917][ T3374] device bridge_slave_1 left promiscuous mode [ 358.061083][ T3374] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.068656][ T3374] device bridge_slave_0 left promiscuous mode [ 358.074897][ T3374] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.083037][ T3374] device bridge_slave_1 left promiscuous mode [ 358.089154][ T3374] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.096988][ T3374] device bridge_slave_0 left promiscuous mode [ 358.103209][ T3374] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.111174][ T3374] device bridge_slave_1 left promiscuous mode [ 358.117399][ T3374] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.124908][ T3374] device bridge_slave_0 left promiscuous mode [ 358.131023][ T3374] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.139759][ T3374] device veth0_vlan left promiscuous mode [ 358.145909][ T3374] device veth1_macvtap left promiscuous mode [ 358.151926][ T3374] device veth0_vlan left promiscuous mode [ 358.158103][ T3374] device veth1_macvtap left promiscuous mode [ 358.164254][ T3374] device veth0_vlan left promiscuous mode [ 358.170189][ T3374] device veth1_macvtap left promiscuous mode [ 358.177075][ T3374] device veth0_vlan left promiscuous mode [ 358.559629][T31140] kvm: exiting hardware virtualization [ 358.565881][T31140] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 358.572563][T31140] ACPI: PM: Preparing to enter system sleep state S5 [ 358.579879][T31140] reboot: Power down serialport: VM disconnected.