last executing test programs: 5m16.763469745s ago: executing program 2 (id=1586): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x20, 0xc8, 0x0, 0x0, 0xa31, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000280)={0x0, 0x80, 0x1, 0x7, 0x8, 0x8d, 0x0, 0xfffffffffffffff2, 0x80102, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4b9, 0x0, @perf_config_ext={0xffffffffffffffff, 0x23}, 0x4000, 0x2a, 0x8, 0x8, 0x5, 0x4, 0x5, 0x0, 0x3, 0x0, 0x7}) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000002300)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa112011"], 0xfdef) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000f8954bcc6744000400000900", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYRES64], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r10, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 5m16.577113046s ago: executing program 1 (id=1590): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4000c0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0xa, &(0x7f0000000080)=[{0x9, 0x5, 0xd, 0x7}, {0xfff7, 0x5, 0x7d, 0x7}, {0x712, 0x8, 0x3, 0x2}, {0x9b, 0x4, 0x78, 0x17}, {0x5, 0x4, 0xb6, 0xd1e8}, {0xfff, 0x0, 0x7, 0x5}, {0x918, 0x2, 0x10, 0x4}, {0xffff, 0xa, 0x4, 0x3}, {0x6, 0x4e, 0x8, 0x5}, {0x40, 0x9, 0x3}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x2}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0xde, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000380), &(0x7f0000000480), 0x8, 0xea, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1000000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r7}, &(0x7f0000000400), &(0x7f00000004c0)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_destroy\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r9) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000005c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x1, 0x200, 0x0, 0x420c1, r0, 0x4, '\x00', r5, r6, 0x0, 0x5, 0x5, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0x24001100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 5m15.88250238s ago: executing program 2 (id=1596): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xe3, 0x598e, 0x3ff, 0x0, 0xffffffffffffffff, 0xe, '\x00', 0x0, 0xffffffffffffffff, 0x400004, 0x0, 0x5, 0x40000000000c, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000050101b00000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffe22, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="00fc2116e164cd0000000000c85b0000000015181187c12b1ac552e3dc92db71c9405a8b", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRESOCT=r0], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r4}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1000000000000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_subtree(r11, &(0x7f0000000000), 0xe) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r12}, 0x10) unlink(0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="130000150000000102000000000000000000000037f8e8994677fa3731b18ea4bf7b487ac6d4859404ef64cb98e0ff132500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x17, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r13}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x7b) 5m15.71908109s ago: executing program 2 (id=1598): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000d9ffffffb702000008000000b7030000000020008500000071000000950000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="180200000000e1ff0000000000000000850000005300000085000000230000009500000000000000a94be0c51261be6a99e5e06bb0a232d5e1f5bc0b6e76f82e9a7cde9e8f1b547edf612a03f1737d951d7a617558b674e1c4fdfd771ebe7c33af3e4917be59ac67f0bbabcb8f41c23ba8d91633a8b9c70e804744dc081ac69cfea08e4e5a06003771bc3f325a6386a9d49e3c13b32461acf0be4b31638c29187d748841f4395494cdac15e52a4b6a2981eb4afadbbdf9157fa588f475c4cd2e44e2129dc6b93993909613e8d95f5610c067d9b97c524c210af077707d71e8512e00"/241], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9092dc1b6dbe9ab5becdcc777", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x1ff) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB="070000000200"/28], 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x4e, 0x0, &(0x7f0000000480)="6a1fd782de6df5a318c2491e72aa33340f01976382e5e441bb4330020065fb22535b53b10db7eff39419df673e1aacc33f26349da7e8e72ccbff8ce60bf4f251d0c8ef1af2c02d905d8f1728d3cf", 0x0, 0x6, 0x0, 0xd8, 0x0, &(0x7f0000000600)="71c4768c864addb3f1a45f395eb78c142017e8bc12340e9a2c54304c74aafd43fa4cb5232c7c1d912d278e002ab07078ef38b5501b8000495e9d94c90b545217424324b7ed9f3ad64e5d0ee06b8b22d5f917c3d23ec7de5fc3ea8a469e256ac131e4cad6712920670237445035d3ce3bd36a639f5cdce1290bf577ac1e54e206c188069df84acb36588db9d9ba3367511bda4d08c6f13dc310857ea579447a9d07ddb6cbd383125c2ab70409d9faa6c949b5b7af537687e8d5a22e8b463575da05a967cf4ade3f4dd32568e5c29376b791c2973c5eae9d49"}, 0x50) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000aaa3f34144e359e4ffb7030000f5f7ffffb7040000f600000085000000430000", @ANYBLOB, @ANYRESDEC], 0x0, 0x340, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080000038fdd7000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) close(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xe6a4, 0x10000, @value}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)=@o_path={&(0x7f0000000740)='./file0\x00'}, 0x18) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 5m15.670661581s ago: executing program 1 (id=1599): bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0100000004000000000000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000007f0000000000000000008455bcadcff9afbb7dcc9c0a79f81edec1d740f63a3749a600a99880c17624650f5e66dc72d6cbbfc8b99555994d5fdd380f6646a734dec742b26fb4dd262afde1319327aaaaa8"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1b23000d"], 0xffdd) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x10, 0x7, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000380)='tlb_flush\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="1a00000000000000d63216bb64a6bdcadadf18a5c6b8464564a77841257704893b44554727460a2e16ba4a4db0262a112c5a9e95a7ba02aa861d09a9485e2e66998a35a27a65477e9c96852c8455dd1e2d22", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/time\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000b40)=""/159}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r6, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001", @ANYRES32], 0x18}, 0x0) 5m15.446003942s ago: executing program 0 (id=1603): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2aab040211136311, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x26, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0xe82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4, 0xffffffffffffffff}, 0x0, &(0x7f00000005c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) 5m15.432053992s ago: executing program 3 (id=1604): r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x8, 0x7, 0x7, 0x0, 0x1000, 0x10000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x2, 0x1000}, 0x4042, 0x4, 0x6, 0x9, 0x0, 0x7, 0xffe0, 0x0, 0xfffffff8, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x18) close(r0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r1, &(0x7f0000000140)="f209e003ac7f9c1f3d339b6419d133aab6f8aeca557f08f9b5a7f55884216bf4b3dbd4abd5053837aaeabf2d5ab7d94ce3e4e0b8216b386201a64b43a2d135666a254db121c5ca9b15adda0d7d4704cdd25d1d18fcf837b626b3fca671dc7996b703ad78e0eb6985b7ad2cb7596e3c4a0e0aa0b4b779811eca606c11307755a6ab15370e1b04421df21069f047e75f0102cc03d16145e36160326570d684d759c0216cbd20602241d1a18d3ba72a9af606d533eac446d3e400eeb0e5f5903cc7636107789d837f5dd5efcb6cdc50b4570bfe66d02e6e01141e", &(0x7f0000000240)=""/183}, 0x20) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x7, [@var={0x4, 0x0, 0x0, 0xe, 0x5, 0x2}, @decl_tag={0xd, 0x0, 0x0, 0x11, 0x3, 0x6}, @ptr={0x6, 0x0, 0x0, 0x2, 0x1}, @typedef={0x10}, @float={0xb, 0x0, 0x0, 0x10, 0x10}]}, {0x0, [0x0, 0x61, 0x30, 0x61, 0x30]}}, &(0x7f00000003c0)=""/8, 0x63, 0x8, 0x1, 0xc7ef, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x101, 0xf21, 0x904, 0x10000, r1, 0xd6, '\x00', 0x0, r2, 0x0, 0x3, 0x5, 0x8, @void, @value, @value=r1}, 0x50) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000004c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0, 0xc, &(0x7f0000000580)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x37, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x779, '\x00', r4, r2, 0x3, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x50) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x5129, '\x00', 0x0, r2, 0x0, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xd, 0x10, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x245ebcde}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@generic={0x5, 0x8, 0x7, 0xffff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000900)='GPL\x00', 0x8, 0x3f, &(0x7f0000000940)=""/63, 0x40f00, 0x10, '\x00', r4, @fallback=0x30, r2, 0x8, &(0x7f0000000980)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000000a40)=[r3, r1, r7, r3], &(0x7f0000000a80)=[{0x0, 0x2, 0x5, 0x7}, {0x1, 0x4, 0xd, 0x6}, {0x4, 0x3, 0x6, 0xb}], 0x10, 0xf, @void, @value}, 0x94) (async) r9 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000b80), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000bc0)={r9, r8, 0x4, r8}, 0x10) (async) unlink(&(0x7f0000000c00)='./file0\x00') (async) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c80)=@o_path={&(0x7f0000000c40)='./file0\x00', 0x0, 0x8, r5}, 0x18) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000cc0)=r10, 0x4) (async) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000d00), 0x571e00, 0x0) ioctl$TUNSETOFFLOAD(r11, 0x400454d0, 0x7) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r10, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000d40)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], 0x0, 0xaa, &(0x7f0000000e00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0xda, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) (async) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f0000001040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x7, [@enum64={0x9, 0x7, 0x0, 0x13, 0x1, 0x8, [{0x1, 0x6, 0x81}, {0x6, 0x2, 0x7fff}, {0xffffffff, 0x101, 0x4}, {0xd, 0x2, 0xce}, {0x2, 0x3, 0xc9}, {0x5, 0x6f, 0x446}, {0x1, 0x7, 0x6}]}]}, {0x0, [0x41, 0x0, 0x0, 0x30, 0x5f]}}, &(0x7f00000010c0)=""/193, 0x7f, 0xc1, 0x1, 0x2, 0x0, @void, @value}, 0x28) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@bloom_filter={0x1e, 0x6e9, 0x7f, 0x200, 0x400, r5, 0xc, '\x00', r12, r13, 0x5, 0x3, 0x1, 0xa, @void, @value, @void, @value}, 0x50) getpid() r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000001280)='svc_alloc_arg_err\x00', r10}, 0x18) (async) r16 = openat$tun(0xffffffffffffff9c, &(0x7f0000001300), 0x200000, 0x0) r17 = ioctl$TUNGETDEVNETNS(r16, 0x54e3, 0x0) r18 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x4, &(0x7f0000001340)=@raw=[@call={0x85, 0x0, 0x0, 0x4d}, @map_val={0x18, 0x9, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4}, @ldst={0x1, 0x0, 0x3, 0xb, 0xa, 0x18, 0xfffffffffffffff0}], &(0x7f0000001380)='syzkaller\x00', 0x6, 0x2b, &(0x7f00000013c0)=""/43, 0x41000, 0x0, '\x00', r4, 0x25, r13, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001400)={0x4, 0x4, 0xffffd0d8, 0x7f}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001440)=[r3, r3, r7], &(0x7f0000001480)=[{0x0, 0x3, 0x6, 0x5}, {0x4, 0x1, 0x5, 0xa}, {0x4, 0x1, 0x7, 0xa}, {0x1, 0x5, 0xb}], 0x10, 0x7, @void, @value}, 0x94) (async) r19 = syz_clone(0x200000, &(0x7f0000001580)="d4f3fe714403df475670a5870f8e3ccfa5659d7aeffb947070d367b49a2053816ba9e5d3b0d3", 0x26, &(0x7f00000015c0), &(0x7f0000001600), &(0x7f0000001640)="cdeabfbf9edd2a29d08280756526e8b0701eeedbc01da619743d4fb51a5d74b16678c5e4504ebf2b361a022be02c8de798a02eb2d45d640775a3021b1c72f6668008e567bdd01803f6f6169f4f95f22d52607428d08950eb9f82f2366010df44040a2b372654910031f1f7ac62c825e4bfe26feea1d23083069b285c121d8d35a5f9cb95a4") (async) r20 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001780)=0xffffffffffffffff, 0x4) (async) r21 = openat$cgroup_devices(r14, &(0x7f00000017c0)='devices.allow\x00', 0x2, 0x0) sendmsg$unix(r10, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001700)="d289b9644368742fb118bc8d18ecb714816fd4dd744a07", 0x17}], 0x1, &(0x7f0000001800)=[@rights={{0x18, 0x1, 0x1, [r13, r9]}}, @rights={{0x30, 0x1, 0x1, [r15, r20, r21, r10, r17, r18, r17, r15]}}, @cred={{0x1c, 0x1, 0x2, {r19, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r19, 0xee00, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [r2, r3, r16, r15]}}], 0xa8, 0xc040}, 0x0) 5m15.337447353s ago: executing program 0 (id=1605): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180010040000000000000030ff0f000071104e00000000009500000700000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 5m15.334754493s ago: executing program 0 (id=1606): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000d40)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000e3ffffffffff5d1300000000ff001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000e1e, 0x0, 0x60e}, 0x2c) sendmsg$tipc(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) close(r1) 5m15.333810803s ago: executing program 3 (id=1607): r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='\x00', 0x0, 0x8}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0xe, 0x18}, 0xc) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10c, 0x10c, 0x9, [@union={0x4, 0x6, 0x0, 0x5, 0x1, 0xffff, [{0xb, 0x1, 0x3}, {0x4, 0x1, 0xffffff81}, {0xe, 0x0, 0xc0b}, {0x9, 0x0, 0x10000}, {0x5, 0x4, 0xc6e}, {0xe, 0x2, 0x5}]}, @func={0x4, 0x0, 0x0, 0xc, 0x4}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x5, 0x4}, {0x10, 0x4}, {0x2, 0x4}, {0x4, 0x1}, {0xb, 0x3}, {0x4, 0x2}]}, @volatile={0x4, 0x0, 0x0, 0x9, 0x5}, @decl_tag={0x3, 0x0, 0x0, 0x11, 0x4, 0xa}, @volatile={0x10, 0x0, 0x0, 0x9, 0x5}, @ptr={0x3, 0x0, 0x0, 0x2, 0x1}, @volatile={0x3}, @struct={0x2, 0x3, 0x0, 0x4, 0x1, 0x19f9337a, [{0x4, 0x4, 0x5}, {0x10, 0x2, 0xd0fb}, {0xf, 0x3, 0x8}]}]}, {0x0, [0x5f, 0x5f, 0x30, 0x2e, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000380)=""/115, 0x12d, 0x73, 0x1, 0xe, 0x0, @void, @value}, 0x28) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xe, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400}, [@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0xf}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ldst={0x2, 0x3, 0x4, 0xa, 0xb, 0x8, 0xffffffffffffffff}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x3}]}, &(0x7f0000000540)='syzkaller\x00', 0xcaaa, 0x63, &(0x7f0000000580)=""/99, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000680)=[{0x5, 0x1, 0xf, 0x2}], 0x10, 0x6, @void, @value}, 0x94) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)=@generic={&(0x7f0000000780)='./file0\x00', 0x0, 0x10}, 0x18) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x6, 0x20, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x709}, [@map_fd={0x18, 0x5, 0x1, 0x0, r0}, @alu={0x4, 0x0, 0x2, 0xf, 0x9, 0xfffffffffffffffe, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x6, 0x2, 0x0, 0x1}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x6}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @alu={0x7, 0x0, 0x4, 0xb, 0x4, 0x4, 0x8}]}, &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x66, '\x00', 0x0, @xdp=0x25, r3, 0x8, &(0x7f0000000440)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x7, 0x3, 0x4b83}, 0x10, 0x0, r4, 0x8, &(0x7f0000000840)=[0xffffffffffffffff, r5, r6], &(0x7f0000000880)=[{0x1, 0x1, 0x7, 0x5}, {0x1, 0x5, 0x1, 0x4}, {0x3, 0x4, 0xb, 0x2}, {0x1, 0x1, 0xc, 0x4}, {0x3, 0x1, 0x9, 0x7}, {0x3, 0x5, 0x0, 0x1}, {0x5, 0x5, 0x0, 0x3}, {0x5, 0x2, 0x5, 0xa}], 0x10, 0x1, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000009c0)=0x1d) r7 = openat$cgroup_int(r2, &(0x7f0000000a00)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) write$cgroup_int(r7, &(0x7f0000000a40)=0x7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d80)={r2, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000a80)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xe9, &(0x7f0000000b80)=[{}], 0x8, 0x10, &(0x7f0000000bc0), &(0x7f0000000c00), 0x8, 0x28, 0x8, 0x8, &(0x7f0000000c40)}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000f40)={&(0x7f0000000e40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x3, [@typedef={0x6, 0x0, 0x0, 0x8, 0x1}, @const={0xa, 0x0, 0x0, 0xa, 0x5}, @struct={0x2, 0x9, 0x0, 0x4, 0x0, 0x7, [{0x9}, {0xf, 0x0, 0xb}, {0x9, 0x4, 0x3}, {0xa, 0x1, 0xffffffff}, {0xb, 0x5, 0x6}, {0x9, 0x2}, {0x10, 0x2, 0xfffffffa}, {0xb, 0x4, 0x1}, {0x4, 0x5, 0x4}]}]}, {0x0, [0x2e]}}, &(0x7f0000000f00)=""/57, 0xab, 0x39, 0x1, 0x4, 0x10000, @value=r2}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x12, 0x0, 0x5, 0x4, 0x8000, r5, 0x3, '\x00', r8, r3, 0x4, 0x1, 0x0, 0x0, @value=r9, @void, @void, @value}, 0x50) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000fc0)={&(0x7f0000000f80)='f2fs_issue_reset_zone\x00', 0xffffffffffffffff, 0x0, 0x10000}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f0000001000)=')\x00') openat$ppp(0xffffffffffffff9c, &(0x7f0000001040), 0x200501, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001240)={&(0x7f0000001080)="8cc2ebc84f1a80f49109200428108043fb0b4ed9965251f2ed01a8586d7eda22b759a59f89a702b00dd27c677907e6052fc6852f3acd22e0fa8ef4cd7fd493fa2a49d5a7b022281a4c1586dc570ef04ae0fe3a1c79bbbbf3023859c332f4bcfc", &(0x7f0000001100)=""/146, &(0x7f00000011c0), &(0x7f0000001200)="19bf52bbefe6fdebaf9c60317d089f698535d03af4d5d6b39be955eab157f107c512368fd5aadd78c8342adf0031a592d58ccd", 0x7fff, r0}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001300)={r1, 0x58, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001340)={r11, 0x9618, 0x18}, 0xc) write$cgroup_devices(r6, &(0x7f0000001380)={'a', ' *:* ', 'r\x00'}, 0x8) r13 = openat$tun(0xffffffffffffff9c, &(0x7f00000013c0), 0x881, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001400)={0x80000000}, 0x8) openat$cgroup_devices(r2, &(0x7f0000001440)='devices.allow\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001480)={0x6}, 0x8) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000014c0)) r14 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001500)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x3, '\x00', r12, r2, 0x3, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001640)={r14, &(0x7f0000001580)="1a41ad102920b9d7c10cd023bed070b8245191d11ef0bfd029e4315948eea904dc2cf02ab8cb046694bf56b42a38bf58612d45dee8e51afd78eb44931b94f8a3fc88", &(0x7f0000001600)=""/51}, 0x20) ioctl$TUNSETOFFLOAD(r13, 0x400454d0, 0x16) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000016c0)={&(0x7f0000001680)='f2fs_filemap_fault\x00', r2, 0x0, 0xfffffffffffffffa}, 0x18) 5m15.321715423s ago: executing program 0 (id=1608): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x2}, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1008, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r4, &(0x7f0000000980), 0x20000992) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000680)=ANY=[@ANYBLOB="8fedcb7910009875f37538e488a86317ce"], 0xfdef) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x20001410) ioctl$TUNSETOFFLOAD(r8, 0x40047440, 0x2000000c) 5m15.251642193s ago: executing program 2 (id=1609): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) close(r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[], 0xfdef) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 5m15.192329103s ago: executing program 1 (id=1610): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8970, &(0x7f0000001a80)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf\xc8>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000f1ff007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r9}, 0x10) 5m15.191922503s ago: executing program 3 (id=1611): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES8=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000040), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="17000000000000000400000003", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) (async) write$cgroup_subtree(r6, &(0x7f0000000180)=ANY=[], 0x20e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) close(r8) 5m15.131057384s ago: executing program 3 (id=1612): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000"], 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="6ab106e559f7ffffff", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010001000000004000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001340)={{r0}, &(0x7f00000012c0), &(0x7f0000001300)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) socketpair(0x28, 0x802, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x3, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="7910400000000000690030000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0xa, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r2}, &(0x7f0000000040), &(0x7f0000000400)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x9}, 0x2}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 5m14.983354984s ago: executing program 1 (id=1613): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x2, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f00000006c0)="78572f7b48e8505b6772cd0e2bbf3306783c8ff2faddea92c0d8e1712c8d6ae6534a4ea0cedd696c5bfa50312e9144e9f89908e19d1f4b7c8cf6a15f727eaeecacef4a75b01e68554c8f7ba10c59c69db11fb50a94628a8b4c5aacf14c9389c73284dc", &(0x7f00000005c0)=""/94}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200006f04000000080000e20000000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000714b1e00006b1109a2e735ff668c69734389235227bed49ab3e270e3745e89221151bb8694b2c5086082d207d61149eb7066d68843db10be4f25682136e44fbebe540de211b3b3615631479115b24a51bcbe347b17427005f12a90649af55154e110ae778086dbd78ea09ee27a18bc3a42d8a8519d8c88e65b64a0bc184e2c188109ab42291d84afdfb3ce7c9c0b2e14c2078e06811f61bd820f0cdce7773e89dc0cda22045bb472bb9117a7c65ea9067ebc7e2d1d8843f3ed79"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x18) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000000c8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x21) write$cgroup_subtree(r7, &(0x7f0000000540)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102032900fe08000e7f0061cd915a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 5m14.640417186s ago: executing program 1 (id=1614): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x4, 0xc8, 0x0, 0x0, 0x201ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300), 0x4) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x26}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r2, 0x0, 0xfffffffffffffffc}, 0x10) syz_clone(0x10000000, &(0x7f00000007c0)="f7ca2a46fbaa1bbfcd3671206417f083911f367e3c8891a1a40d58c646e48e3dcce01e0c6cffc33245a4ecff05e0fa50da99fd06cf7df97633b9662db825270d75419a57d67a1d7429d27fb7a6a6a5e5775dd521dfc8586c0dbff88ecf7a6ed4443c927855415141ce74e00fc6b32e305c0213b7ab7620445b3c9c56e7ed2985f95668f94883187167270c693537fb0a49c0504911f9098c55edafd96b5cf7c5df1db97e2d69fbd198d5eb0e77368728c919a51b7b07d6856b32fdb37e1ba6eb8a206cf4cf2d89a526fae20e809a79739daae2d9f3208e", 0xd7, &(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000580)="0731a9ea67a7ed8a5397563deedba78165dd1b60689c02ba11e7d643f1135498c1d96f476eb3130b20453dd04f8278c2da08121b1a6ed1a72154eb77abe0d759e78e5ce7bb1787bad1ea005a7bd5530ee09b1f2de35ae7111b7dedbff49aebccdf41aa734c3eddc6b0a993925edf349ac33b8560c869665516c027ff474f9909a085cd6a1d42495b6d15ea11dc7325dc78a2fa713e1868") bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 5m14.639596436s ago: executing program 4 (id=1615): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd986c6a6700020006aa"], 0xfdef) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001600)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x35) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec850000007d000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='signal_generate\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r10, &(0x7f0000000c40)=r11, 0x12) syz_open_procfs$namespace(r11, &(0x7f0000000040)='ns/cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000009000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe69, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r13}, 0x10) close(r8) 5m14.541390447s ago: executing program 2 (id=1616): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000eb5ea981b89f736a55dd71f972cd54b78b24986504678cf0931c2f45a04980c13823d579e3a06a117c6f7e3dc2c7fc43a72b8d1c15f2952b66cc8fb9198778db1da293226dbcaaa058", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)=@generic={&(0x7f00000003c0)='./cgroup\x00', 0x0, 0x18}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000e8ff0000", @ANYRES32, @ANYRES8=0x0, @ANYBLOB='\x00'/28, @ANYRES32, @ANYRES32=r0], 0x48) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = perf_event_open(&(0x7f0000000700)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x222b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000280), 0xb}, 0x0, 0x0, 0x2802, 0x0, 0x400, 0x0, 0x32e8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r5 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x21c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000}, 0x0, 0xffffffffffffffff, r4, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x7, 0x8, 0x23, 0xbe, 0x0, 0x9, 0x88, 0x9, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000440), 0xa}, 0x108, 0x2, 0x501, 0x1, 0x3, 0x80000001, 0x774d, 0x0, 0xf, 0x0, 0x200}, 0x0, 0x8, r5, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) unlink(&(0x7f0000000140)='./cgroup\x00') r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) 5m14.397275558s ago: executing program 0 (id=1617): bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000080), 0x200}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x3}, 0x38) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) r4 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r1}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x20005, 0xf, 0x4, 0x10885, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value=r4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1808000000000000000000000000000018170000", @ANYRES32, @ANYBLOB="00000000ffffff1fb702000014000000b703000000000000850000002f000000bc0900000000000035090100000000009500000000000000bf4800000000000056070000000000001d05568a1849939f8500000005000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32514, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.empty_time\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r5}, 0x8) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1f, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="660a000000000000611158000000004b6a00000002000000950000000000000027318e7acb7342972aa2f53f90798ecfd41d07cc88b95f9ded31813f607caa4076aa3ac1605e1a1eac30d9df74b23f57647a6692585b11426d2caa0a2e96868e3160e283fefa7d863e6b8982fb28ba796e8597205a5754aef0d7266ade65b695e846b14fcd31ba2e5a763c08e0e746497ede70bc4af8e69d69169ce80b4136e118cd3ade01011b06784a7bf42ff5d86c723f6af0f8620d9ae2dd2ef8d2d4ba9390c185cee8613dae3ab815fb0bd65a1c45d07b6f338279c0ed"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) close(r6) 5m14.308968298s ago: executing program 4 (id=1618): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='mm_page_alloc\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000073000000850000002300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_free_batched\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000580)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 5m14.211267549s ago: executing program 4 (id=1619): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x82, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.usage_all\x00', 0x0, 0x0) r4 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x5, 0x1, 0x8, 0x0, 0xf400000000000000, 0x4000, 0x6402707fd83beb85, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x0, 0x3}, 0x20a, 0x7dd, 0x6, 0x9, 0xffffffffffffffff, 0x7, 0xa, 0x0, 0x9, 0x0, 0xed}, r4, 0x0, r2, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r3, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdf, &(0x7f0000000480)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xf3, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x2, &(0x7f0000000240)=@raw=[@map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffff000}], &(0x7f0000000280)='GPL\x00', 0x61e9, 0xde, &(0x7f00000002c0)=""/222, 0x41100, 0x2, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x1, 0x7, 0xfecc, 0x7672}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000740)=[r2, r0], &(0x7f0000000780)=[{0x1, 0x2, 0x4, 0x8}, {0x3, 0x2, 0xf, 0x6}, {0x3, 0x1, 0xf, 0xc}, {0x3, 0x1, 0xc, 0x9}], 0x10, 0x1, @void, @value}, 0x94) close(r6) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000880)=0x1) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f00000008c0)={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000001cc0)=[{&(0x7f0000000900)="d90624f981a618e3eab22aed6f06ccd01112775b4a03e54ed15c6df3b1c0a0cfd6a585831cbb8fb344a50720e9a7b30b7a7b0e8e3743f49d300693ba2eba3a15ba8a80d4c3e280da31deb71aaea6e2a43831e87492b3b44bdd44a56bcda596f68d66a8e423551acfac325f4bec9405ccb16f053415bfe439438af5c71794455b2375d2e3e7e65161e714bf64e0f3699f7db89df682d2cb79431e27ab4b4df6bbdb80b76306a8b895b06e5ad16fd0e24283c9c0400333a79b3886786f9c32d6be585f213bca1b6762b64282146dec71b7f53a27aa0fe113dcfb273e65fa5d51ecfefdee51020427e4de40d416a16ecb479d14204106681dde543f279925ff2e985b2df1509d685fc5a7b7df279db6f930bf34c1c6c074481aa131abc76d81401dec5852dcf45460a04ef82c3ad1bff3e4c1414e78540e8e056f47dc8af1852032e4c645edb96942ff6f2ec7c7076f04578288e24f5b526356791cecbf4029999a37699c54693e7bd114d97202d658d02ad7c7e2eceef1d91f1ce32d7abad9234303829a821ced7a51f014e39afe11cba0f535cc9c880153b7959a849daa38a5f1985451776bbefd9b81bcb81e69b76ee015bafc2cbcabd91d60b84fc0c3445bea90c18a26f7f67230ce61a6b68889b787d9fa5ef2ac92cff659ad737f47b0b5c77fc57a715d8fe0975fb9033a81f2e0d4812cdd66fe22f1c3d0984965be594bbdee077880296e4b50f74179fd1f4b437754cf9e85da388efe40b0e6341996239bba7a7394fa5a1746b7ce1a1cc7b6ef1b5aeb22bf16790b6c1c360b4941fab945f4aefd1c22adda47409dc98cf2a8a11ccca8e7630c61614ed59705d3f8fa4add5da78263f573354e08a30a5bc60cfaaaadafc5e7574e8c4c2d81cc23c37727a6cf5d4bffa77da41dc5230416226ee59dbf1111d1c6118bab5883cf12543826852a7609907e09db85954db432448ddcdd2280c8e42a2009dadf262786c300adfb47be9e2081d67a8550bf033b54c9100d5a95f5a0e5db30b6bac428bd4acde5dafcacde46d8fef4b70b18115372b050327f1dbbfd43280824b686654e8877aebc553990e30eb7b7a2312a69b836a19bce87af477cb3d10984d770b01530f6099cd7760b69a1429a4541c2c454218b4e18d5e22483750e37136ef634147918a3ee19493d24c33d5deaadf14dadb70c42565915ef03843f8c2f876737ee8b2140fd4abef985cb6c270906b5bfa38af12a0a121e6e43d83e8dd67fb46b77dd0629e702ff8bb93cb8efda445abc9ee3b75be8e81ed59f0e36821465a2adf59c43a0c96404feca3b0910fad9204bd681588fa90d0cc564e2e25f55a1820df55cde271447bfd53223a5f11eb35228fdde942a85c32aaa8c115bf696697d3abe15770c148ff418128d5f2d20ca9e5e26ce156dda10c94866472bb689518fb6bc8b17a2e887d09427bc41c489e06ea4cf05f658c47751654c8ee8d5185a81ea2dfd928b2b9011d53e722601d8e67d26389fe77de3973568b7fc7038f3f2b4410c05d653cddd5053811256a596cd7131b5075aed251bf6af3c47b4012e83f6570c0603ca305dd2951972d08f847000655739cf9895cce943d4bd5a6b67b9ede9d939ad8ce58485b3699df08545a59ad0322ecd2284d225bea13248250b114fa3fd999cfc5097e53af74de87ec3b12f2ea09d3e606d724c670b2c9c57e692dff343d1cc35ec519070bbd8183167f8abddd3015688d4c30ca62d80aff21f9f8075ec74053afae20f2a520ab679bbb96d945d2cfb15cc25a0c6df24180a85a49ab1b25ff59a9751195ac77023b04cd606c1fa4968f4c5694fb5bf48c61ba3b007f468cfb3f29f821571e723096e25d85ebd3ff70d9fe5c086b2ba1aa2dcbc9c0f3b710584c27a8f757b40b5f028430c0308b4bd5609d2ea994d97a91b7a5b1d33c0b92db517425eabdabef3ff573258edae8dada1d251e0a54f49ea7c5467f42116964d436c700bd753e416589fac2a7e420b6587c562c7a8092877d403f33cd9ae4a4bd1bb3bcd0f4982df9032d2fc5ffc5b09dbf3566586e9bf37d918052be91dbac2de3baa2b6bd1337754a55e9b51827d35fcd7470bbfd348f966eeb01b6322bbd92b3d8bd44fc6e2e66f8a37795c1e59a3d0ee2218b8af38888dcadf5e676331a0cdc47ad0246b01e83413e4a5ef71330bee9ea8a4177e3caacf7852cee3fb1ed8717d3b843f81d8653ae4cff6d905d3fcf938b6c92ca28342199fd8a2121dd3b704222fdad899401a47c2a75bfb360a86735fd243d8dcc36b6c7979d3c2c094cb5f3e90a37fc109d86da55acac202c5b085798e94c4f869a6c817b2b3431aab2039cd6263b5e3c170ec543be41b5ab57ecb2703a5738e4f554f4c91616c8a48e2b855a3b21b291c7e1c6bd1656d8fb6a539f6d7317c4b9037e0beb5c8536b035ed30c5129fb9f5c8fc75d8806914057895b7407946e3f8f8de2bb5f4b852abc2bc2e15bcdbe2870387eab944aec965188fbaf10b093f1f92a0b7b9c861d59b8f6a021860853b0fc2107507c0e8c07016f003a37c6382f989e401aa5c3993342ff40dbef3815d25654db3771fdacb6fd74614640482a6d0288575a834f6cc57ad837f31bc5f47fad39bcd55845376f4acecdd048d0a0b7bd5925cd66420cae95ff210ab0ec9da04ce61cb8508094bd09fcbf24a8e0583e09cff4115562bf2ad179a225fba406ab1b7214eeef11718312b9bf1e8ee81570fd644ca9f14a1f8c60394145b67921b444407d9259956920479eeb8a403d00b2d337f97888042526bc6bbc7b55830c3a3f8f8e1317a277e119a43024ecf679458ad8e42e51aa1c288e9bf6cb80dfe85355e82c8fe6dd8d909044f124a904d7e7a0453c72e76df937e22243377c1ffa16d08a5dde78fb83786393e9f7870cf113e7d5390d7c652c47c9e0abab65a2986ba7ec449eb6f64517683ed788e7af0b5dccbc438c53d420679028b2ed1b8f0f0d5372128ed4df6ec5684bc7590cd3752c073a049b34c0a96810179347a06c3ba2a0f16c097356b33fb9839ec9afc76ada4a1c5e6e86347bb3957b79fba8e86230a344b3c3082e679227cab159ef284789ee3511ec91022e443a16dceff96681558b4527f404ec802912d39814888e55e51fb0baf7661b55fdeba6dd7c2dbffe0a8b41dd53434a06ebd642e44a10197b75e108a740c75bbd230152729288a2da3ab5762d1f126d04d1a659c2f970f46e38a8a435bef05268d572489995d7c42df366bcb10dd755fcafdc1b191b69f96b8b4db14912a6cb6686d636a03b2083ac4da2ae33c2130ea684d02455b23fd4e128f989a8a3ea3b2101422a203256a5d87c964a68d8d7406b71ef8cd7c39eae8108375feeae15f13926bb096d4d616083714e0f8b80a9c1c8abd71052ca0ed99cd440e10b11cd0c89f63ffa5f8e02c49ac12f2653cf6c32eb7928f7c1ba43d35565b8fa9e371374f4e26a5ebecd1fe3a7f4c3ab0b6a32c872781208e624bf991e3eaeb0128e36119b152834de4900262ea1cb3c680a78fbd85ffaabcb855c86fd08da805332b50275d7647967e0ee16c596e8f5f6965138decfddc171007b9d13d79f02201f6932f9640ae89e797292a8b37826378e545a73af735ed3d9d2d877012b5f353912fd7bb91b98966e9e7533aa1adbc461b51ead7f2b075b8c3299c8372687dc846c2f36351fc7f0d5922828371125198e8177ccb145334fc9362d8d78c2d2bd5045d1774d9433c353e298c55293943d66a999699cbaa500f45a53736a46871c07e6d608928c82bbb76da74443c08480c2081323f2351683463d0e22667d73b3a6a48d9a7ba1dae4dc4a52e0a8d7cb89731781395d2d32b8cba09410af2ec7463f2adc318290a6508791fb3bbf301bba86e4ea515499c7fe8d116b0079bd2aabef3ef4ae6eda74a6736dbfb7a04c8e435b611d949ca216d2570835a0b4ccf9e28799807c19e5b9b06a67fdf39e1dc6f6250cea5b0c38a3fc2707c877c864321e9daaa9575f5650da0099d0e2034308b3788418e852fbffe3a78719eb14b2c21c8bbc7342aed29e99e32e0cd47eae53a6eef17101dd8ee2c060ca0060d1dc46e409e1e94c3efadfc8278e6421f33573e095a542815368ad4e2c4c4e231203dca7e432101f3fd35ae0217707a11618794a2f158d5ad8b7e135fb8c4ed03dcd68286afd2915651d5549d9ec168bb8b1e64b8ae610fe8908789d828bcb5b1708c67a9e6450a8f5669a7f1a2b23055ebeba48f000f2870992e2705e602dcf7ca03c2c87926ee0904ef9550052ab2c2fa011fa17222a6dd6669c2eea46c324709bebc557d055fffffb61e3f23ab02a645fd76414500bf98f21ccde6f04863ba24e30552d36a700844016ecfd4d366a4305cc3c96988309520a21d6378696d8bc83973b687afaf04dcc63e0d1bd4db0d30aa8586ec39b421f6f439e158141e47480ce731020ebd60bc52d5b33f373b3d8f714d538635599c09dcdb99bff05664c536badf39221fc9cecff1beda280f83eeec83d5c03df904b472fe712bb403ec79df5feb75f4cc27a9fa7b7c823b486e163e6f7aae1c9db5b996c1f8007798f4d8b6f37915b5d5d93bdcbcc801b511deeac452c2337cded639a668fd96d9f8d4ce6dbc12ec60885138b4e9add06a571900120fe359ab56015a7d13f930f7412aaa253b89fa4bca50eb14b79793c266bfc3b245eddd90ab22d31b32d83864a5f592ba5168ef0818e893671536f6b40456bbd09b6391787fb994b3ea3fe684db0276eb0bc7b8b46f2e4c6b19544f73d37254ac7f39d860f9793639ebae9075e017cccec30f2ee40b428d920ae051274e0013b77f37ffa7cf70eafc25463fc6b3b170a16b17fe2bbb4ef1177ce526be109aa5406e3310c7b73f89ccfa6a3078d95ab000b54facf458e62eae013151f90beec1b44e4f0286029505c600881c88385622847f0d8932e08d53a6293ade4286dc4c16c04dcd3ddb1c6400bf819ce3e6321ca532a5e34570dc0bd7b8807e00eb5a6c5300bd7bb20e13cf4c149262cd6e33ef8298bfb5eaf1b7e6af0ab2ba99a2dc390edde9eafa345ae874fcd0544983e74c2b5c3c32d81ff18c8b0cd58a78ba81e1373961681788a206ca6d0b39d3abce6a7e99048a8f7184a92a03ff6aa947c503968c7dea5f81d5880f59bdb071baed311101ec3f2860e92f54690f59932c26053300181fee7d0d6f4b78fb28c4e172f3290a52a26fa0138249bbfa19966ae40e447ad4a02eb0ebf11e7af55e9449e8c41906f5e2cfdc83f5b7ca164f0b760a054597918951265fda588f6945703043ebb8e5504dbfe6cef7db794fbf47c5c7d76fd80542d2defa6a3f3fd93b34b74c02f6e5f97fdcf799dc55cf99a9ac77d52e908b02d3ec4a354efa48d43471fd6539bc4e76a247d9b81e3ac896ddbb3b84725f0d36cc53a0bb5ea8a70b2a538e8b932c77e3afc0d37037a54cfe9566286eabaeed9fa911ae4997f578a3bf834d78ffad5a25c1f078b166f0684d7590ecbbd07a61f2bfe090cbf1cd2334f6abc3e1fa4f1086c9a4b06cea3fa6ed8027318e9f86fedf7cda5b33f4622ca173ff98bed066abff2038c7106484827fbf2d2b9d438e8cabcb222944c76c89a28ee4a8e1cf1a0c33891f4cfd470a62ba6932069e953342df56dc3912bde1665a9c2f1342d8d844b68584a3b3f1e548e080937053fb6af0d4f81d30d1bb1d11a916730946794287c620fe21c001e71466974bcf5c9c613a06c1271c7156d6cff002830727d5d3d028073cc268d3502baadd3", 0x1000}, {&(0x7f0000001900)="977fb510cb4dcef7e2eb2d52f16116e08e15c8679bce1045187e3755db12fda92537a45217aed3770f726d9e28ba84513ee44d0d529edba214075e6b4aaddb9dbf05ac5d7d004380d8b92db1ad3c4dc4e792a17ddb1a8777b0c8fedde99780cf0d8290b710e0f98e1d71ffb37140e7da9fbb321b79cdbe7cf0137b71a2e8189e619c81416a8eadddad19fcc436afb861bec93172b4cb6c27edb6be44bc6b9ac785b97f6930ae4c50c90c8233c241f47afa72f8207b7c5586726f0bffdb8451885e8e064950282030f6ad061b56206637cf5bda344a820b31b77172b4f7167179af41737f4d1da12ee8cdc62fad1349375a", 0xf1}, {&(0x7f0000001a00)="69dbb123920ed0efb788d0c6d7d6559892d8cacc162c9712b0d744c780ec84910f373d4caf76e722cf4dde8ddd0f69f6948a74b3391612eba150d22d1885cea121904c99d4080d0866a50c6d5aee128bd2f5f3ca47a24ba68a20017662a770d1db1881262c62260865668372b4bbff67b8e6d07201217ba316d250b3968bbd8dc448e373e2ed5a5616f72ba1c978b6c3365d663ed47b4f73a67a77127303f9a048f6a51ce432f055d2016dc007ddf4307cc18a89fa21052900fb8a3fb98d2519b5377df04a38e584a6da2aec", 0xcc}, {&(0x7f0000001b00)="c5c52fbc9ba93d864bf8667257f21e810ad6c12f69781ea9f8ed10f59f1f9a178c56dfcf82fa519a61fe8533621a727a04731df212d414745a5017fd9d6b882bdf8ffa068f3af8b792e0ecb65d4b223eaee2cd17e821a534a14ab617fa768e3c06641c53ef1dca074e53", 0x6a}, {&(0x7f0000001b80)="b65a7179d9b18a9225807f86a8961a9940b8f1e113e9a6b905d3083538d82369ab5c6f8558f98329cd014f1eac961299f617b73b1ea91063125ab5186a7b4612887d239a35c82ce9f1397756b5137c76ea3aded43b98c0f2e6508c82109a496a861686096212007b4532e699218118371720", 0x72}, {&(0x7f0000001c00)="8c777dd511e39e9220c55453a95bd04a03383b51f8feefc080ca97c2494536f9afc69b614aeb56c58db4c9a81d04e39284abacaf24af29341005d3f4745fec98839edc8274e2dfa8a672b368510ccc57c307bc38b99556cc994db81b99dcabb3c06ebc1f5647369b4592f70f64a8a75ce58179ff45f79317327414ec526c8fd703fd0e9627c08bc2b1ede75650c287886f4d0a60907eff64c4dc64b429d9bf97", 0xa0}], 0x6}, 0x8000) recvmsg$unix(r6, &(0x7f0000003580)={&(0x7f0000001d80), 0x6e, &(0x7f0000003440)=[{&(0x7f0000001e00)=""/1, 0x1}, {&(0x7f0000001e40)=""/94, 0x5e}, {&(0x7f0000001ec0)=""/153, 0x99}, {&(0x7f0000001f80)=""/20, 0x14}, {&(0x7f0000001fc0)=""/240, 0xf0}, {&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f00000030c0)=""/199, 0xc7}, {&(0x7f00000031c0)=""/245, 0xf5}, {&(0x7f00000032c0)=""/249, 0xf9}, {&(0x7f00000033c0)=""/102, 0x66}], 0xa, &(0x7f0000003500)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x2001) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000035c0)) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000038c0)={0x2, 0x4, 0x8, 0x1, 0x80, r10, 0x414, '\x00', r5, r13, 0x0, 0x1, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003a00)={0x11, 0x24, &(0x7f0000003600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x9, 0x7, 0x0, 0xfffffffffffffff8, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0x94}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000003740)='syzkaller\x00', 0xf5c, 0x89, &(0x7f0000003780)=""/137, 0x40f00, 0x63, '\x00', r5, 0x0, r10, 0x8, &(0x7f0000003840)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000003880)={0x4, 0x5, 0x0, 0xffff}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000003940)=[r12, r10, r1, r11, r8, r10, r14, r2, r0, r11], &(0x7f0000003980)=[{0x3, 0x3, 0x10, 0x8}, {0x4, 0x3, 0xf, 0xb}, {0x5, 0x1, 0x2, 0x3}, {0x5, 0x1, 0x1}, {0x0, 0x4, 0x2}], 0x10, 0xc, @void, @value}, 0x94) socketpair(0x23, 0x5, 0x3, &(0x7f0000003ac0)) bpf$PROG_LOAD(0x5, &(0x7f0000003d80)={0x65b0d06affe3d46b, 0x14, &(0x7f0000003b00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000003bc0)='GPL\x00', 0x9, 0x51, &(0x7f0000003c00)=""/81, 0x41000, 0x1c, '\x00', r5, @fallback=0x27, r9, 0x8, &(0x7f0000003c80)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000003cc0)={0x2, 0x9, 0xb8f, 0xfffffa3c}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000003d00)=[r1, r14], &(0x7f0000003d40)=[{0x1, 0x4, 0xd, 0x3}], 0x10, 0x7f, @void, @value}, 0x94) openat$cgroup_subtree(r8, &(0x7f0000003e40), 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000003fc0)={r11, &(0x7f0000003e80)="573b7b6b3274ea1ad3d2024811871c98bfca5a879b5c945bacfb3187330061998517aff97cdbc6ec6a75508ce7192c3d691a146d383736596e4a6a0e527e42eb5ed89ba2bf6be02bbcb4fbc8a19310565e12", &(0x7f0000003f00)=""/164}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004080)={r12, 0x58, &(0x7f0000004000)}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000040c0), 0x2c740, 0x0) syz_open_procfs$namespace(r7, &(0x7f0000004100)='ns/ipc\x00') bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000041c0)={{r11}, &(0x7f0000004140), &(0x7f0000004180)='%-010d \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004340)={0x11, 0x7, &(0x7f0000004200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}]}, &(0x7f0000004240)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x1c, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000004280)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000042c0)={0x2, 0xd, 0x8, 0x10001}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000004300)=[{0x5, 0x5, 0xd, 0x8}, {0x4, 0x1, 0x9, 0xc}, {0x3, 0x2, 0x6, 0xb821db84ea614889}, {0x0, 0x2, 0x1, 0xb}], 0x10, 0x0, @void, @value}, 0x94) ioctl$SIOCSIFHWADDR(r9, 0x8924, &(0x7f0000004400)={'pim6reg\x00', @local}) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000004440)={'dummy0\x00', 0x10}) r15 = openat$cgroup(r8, &(0x7f0000004480)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r15, &(0x7f00000044c0)='blkio.bfq.io_queued\x00', 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000004500)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8924, &(0x7f0000004540)={'team0\x00', @multicast}) 5m14.207668309s ago: executing program 3 (id=1620): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000a61a7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x6, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) close(r1) 5m13.95676448s ago: executing program 4 (id=1621): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() (async) r1 = gettid() socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0xfffffff8, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) sendmsg$unix(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x30}, 0x0) 5m13.95416391s ago: executing program 4 (id=1622): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xe, 0x0, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1a, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@jmp={0x5, 0x0, 0x2, 0x1, 0x2, 0x6, 0x10}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffff5}, @ldst={0x0, 0x1, 0x4, 0x9, 0x6, 0xfffffffffffffffc, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0xa42fcb5a901d8f42, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1d, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) perf_event_open(&(0x7f0000000380)={0x1, 0xffffff84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="66a8723e05000000010000000100000000000000", @ANYRES32=r0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="020000000400000004000000000000000000000000000000000000008d44cf60ed3875ff2be2d08edcf788ba6cd240fe0531e8232f9968e1eda95378f37d18204c4514b20419899414ee6e6d02f3200e7e7ea6e104b5ca5a525aa5da70484559271607cba0bc54f932e6ed9f182e96bc4fe4e4b1f32ed14bd39a9c03e8dbcfe5c27be39aaa88306ad52048cb1922c11b011df3305e0df32be4ecb3cfb8c99278dba3ea70fc2628e8ed7e76ec7ec2e8831e4a915d21bcbbb4e979edf45385d94e6dd09f7a5c8c3355353d288b1cf6085d892438d694f6e3af86469f5c363459191689b9fe3e94294f986b6daab07350bc87924f8fa59031bfc44a3b6d77d8424ad9165c34ed9f33f1bf2b9432094584f253fa36533ea2ffbc684d16f31779f9eb85d5f871be"], 0x50) write$cgroup_subtree(r7, &(0x7f0000000200)=ANY=[], 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x2b, 0x5, 0x6, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) 5m13.93194554s ago: executing program 2 (id=1623): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x8}, 0x0, 0xc8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYRESDEC=r0], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x1d}}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000300)}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000001380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000950000000000000015534dc7e05a494c07451f5760a74649d6e617075a8b7cafcee33c21149ce527f696caf975d246454c8fa3544453efa5f47f6f579c759da8310a879a2ac6c638d41935210b4f80f8e9c235d7501826980188a59c268213412821a12c94eda63f62a19938975b5e4cfaa66adee8cd8b0eb57fcbf632ba435416aeccca3735aa6e41357bbec56085b3393dee5fd9034872214b07"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000002c0)='sock_exceed_buf_limit\x00'}, 0x18) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000014c0)=r7, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000000000d15ff161eb141e67e3aa0875000003007bd0036303210ac638f17da4433ecc0d69c16df6c0fa"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000680)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="5a6e41dea43e63a3f70cff11c72b", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5m13.93127969s ago: executing program 3 (id=1624): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e488a863726558"], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x69, 0x10, 0x16}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r5}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) 5m13.8998302s ago: executing program 0 (id=1625): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x3, 0x0, 0x0, 0x0, 0x5, 0x404, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1000, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0xa, 0x5, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f0000000300), 0x20000000}, 0x20) r1 = syz_clone(0x60000300, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)="8608dd56fb6f507e12cb6210d90e8e8a1cdadc2351459fd889a48d26da43f4525a0de93f5cc7f903ec13cdba3078") socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000540)={&(0x7f0000000200)=@id, 0x10, 0x0}, 0x4000041) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b00)={r0, &(0x7f0000001a40), 0x0}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b0009000000e6051f444ac5a0793e6e63c4213b7f000900000001000000", @ANYRES64=r1, @ANYRES16=r0, @ANYRES32=0x0, @ANYRES16, @ANYRES64=0x0], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000400008500000001000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='fdb_delete\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r6}, 0x0, &(0x7f0000000040)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r8, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000500)={r8, 0x0, 0x20000000}, 0x20) ioctl$SIOCSIFHWADDR(r5, 0x8937, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x56, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 5m13.809921231s ago: executing program 1 (id=1626): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="050006000500"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000300"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/pid\x00') ioctl$TUNSETIFF(r3, 0xb701, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xf, &(0x7f0000000840)=ANY=[@ANYBLOB="058030000100000018000000070000000000000001000000186200000900000000000008080000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000085100000080000008500000030000000"], &(0x7f0000000400)='GPL\x00', 0x8, 0xb9, &(0x7f00000004c0)=""/185, 0x41000, 0x10, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x0, 0x6, 0x0, 0x9062d06}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000140000000800000040100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r4, @ANYRES32=r1, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0500000004000000ff0f0000050000000000000029ce969262f5823d7fe07d1e818299b219af9539d95383916022fd9a2d73390ddcc54284019553faec1d4a94b3cccd85cd6114bf7f622cb201888fde8e59285fdf178de3f360594401beebcf83563376efeeeffccb66ea3b142d89c52c3b940910c9d7de5ffcdad06269b6b531c2f372e905df139450f282f15ab6c187cf3642dd643e086d68963b188d9fa46b5e744a9adc42067c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="160000f3ffffffff05000000ffe3ffffffffffff82409235a0305f4f", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000005c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 5m13.805883331s ago: executing program 4 (id=1627): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000080ba3bdf9959cb175ef54debfc48d1d02bb7e650a520bf130cee2b69808663d35842263af6abc46462cd16097b028862119ef2949c12ae88b23893e735020e7f901173449f9061c5f8cd412ea28cf62af0d3e17627321dddb7b28c15a3d20376f3170fc4796760b41fead473fe4e4c314c2f73480dc97326a4a5cfc48cb5a431ded00cd1bcf82f47054f2d3adec558188ed3d819f88d00"/188], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x30036, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2402, 0xc8, 0x0, 0x7, 0x8, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x3) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b0000000500000000040000090000dda60001000000d01f444a8b9e332d337dda722989", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r2}, &(0x7f0000000580), &(0x7f0000000540)}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(0x0, 0x40) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) (async) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) sendmsg$inet(r6, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg$unix(r5, 0x0, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRES64, @ANYRESDEC], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc0189436, 0x20001412) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x2}, 0x8) 4m58.734658632s ago: executing program 32 (id=1625): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x3, 0x0, 0x0, 0x0, 0x5, 0x404, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1000, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0xa, 0x5, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f0000000300), 0x20000000}, 0x20) r1 = syz_clone(0x60000300, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)="8608dd56fb6f507e12cb6210d90e8e8a1cdadc2351459fd889a48d26da43f4525a0de93f5cc7f903ec13cdba3078") socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000540)={&(0x7f0000000200)=@id, 0x10, 0x0}, 0x4000041) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b00)={r0, &(0x7f0000001a40), 0x0}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b0009000000e6051f444ac5a0793e6e63c4213b7f000900000001000000", @ANYRES64=r1, @ANYRES16=r0, @ANYRES32=0x0, @ANYRES16, @ANYRES64=0x0], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000400008500000001000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='fdb_delete\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r6}, 0x0, &(0x7f0000000040)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r8, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000500)={r8, 0x0, 0x20000000}, 0x20) ioctl$SIOCSIFHWADDR(r5, 0x8937, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x56, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 4m58.705388203s ago: executing program 33 (id=1626): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="050006000500"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000300"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/pid\x00') ioctl$TUNSETIFF(r3, 0xb701, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xf, &(0x7f0000000840)=ANY=[@ANYBLOB="058030000100000018000000070000000000000001000000186200000900000000000008080000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000085100000080000008500000030000000"], &(0x7f0000000400)='GPL\x00', 0x8, 0xb9, &(0x7f00000004c0)=""/185, 0x41000, 0x10, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x0, 0x6, 0x0, 0x9062d06}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000140000000800000040100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r4, @ANYRES32=r1, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0500000004000000ff0f0000050000000000000029ce969262f5823d7fe07d1e818299b219af9539d95383916022fd9a2d73390ddcc54284019553faec1d4a94b3cccd85cd6114bf7f622cb201888fde8e59285fdf178de3f360594401beebcf83563376efeeeffccb66ea3b142d89c52c3b940910c9d7de5ffcdad06269b6b531c2f372e905df139450f282f15ab6c187cf3642dd643e086d68963b188d9fa46b5e744a9adc42067c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="160000f3ffffffff05000000ffe3ffffffffffff82409235a0305f4f", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000005c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 4m58.690510693s ago: executing program 34 (id=1623): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x8}, 0x0, 0xc8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYRESDEC=r0], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x1d}}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000300)}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000001380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000950000000000000015534dc7e05a494c07451f5760a74649d6e617075a8b7cafcee33c21149ce527f696caf975d246454c8fa3544453efa5f47f6f579c759da8310a879a2ac6c638d41935210b4f80f8e9c235d7501826980188a59c268213412821a12c94eda63f62a19938975b5e4cfaa66adee8cd8b0eb57fcbf632ba435416aeccca3735aa6e41357bbec56085b3393dee5fd9034872214b07"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000002c0)='sock_exceed_buf_limit\x00'}, 0x18) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000014c0)=r7, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000000000d15ff161eb141e67e3aa0875000003007bd0036303210ac638f17da4433ecc0d69c16df6c0fa"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000680)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="5a6e41dea43e63a3f70cff11c72b", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4m58.662971813s ago: executing program 35 (id=1624): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e488a863726558"], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x69, 0x10, 0x16}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r5}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) 4m58.641757703s ago: executing program 36 (id=1627): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000080ba3bdf9959cb175ef54debfc48d1d02bb7e650a520bf130cee2b69808663d35842263af6abc46462cd16097b028862119ef2949c12ae88b23893e735020e7f901173449f9061c5f8cd412ea28cf62af0d3e17627321dddb7b28c15a3d20376f3170fc4796760b41fead473fe4e4c314c2f73480dc97326a4a5cfc48cb5a431ded00cd1bcf82f47054f2d3adec558188ed3d819f88d00"/188], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x30036, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2402, 0xc8, 0x0, 0x7, 0x8, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x3) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b0000000500000000040000090000dda60001000000d01f444a8b9e332d337dda722989", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r2}, &(0x7f0000000580), &(0x7f0000000540)}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(0x0, 0x40) (async) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) (async) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) sendmsg$inet(r6, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg$unix(r5, 0x0, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRES64, @ANYRESDEC], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc0189436, 0x20001412) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x2}, 0x8) 3.525017671s ago: executing program 5 (id=4986): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0xd7, 0xa8, 0x6, 0x2, 0x0, 0x0, 0xb22, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8f, 0x5a}, 0x40, 0x9, 0x2, 0x6, 0x800, 0x101, 0x8001, 0x0, 0x7f8, 0x0, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0x10, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, {}, {}, [@jmp={0x5, 0x0, 0x3, 0x9, 0x9, 0x80, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x10001, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x2, 0xc, 0x7fff, 0x2}, 0x10, 0xbc51, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[r1, 0xffffffffffffffff, r1], 0x0, 0x10, 0x1, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cgroup.clone_children\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x6a) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x20001400) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="06000000040000000800000005"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) close(r0) 3.140140843s ago: executing program 7 (id=4989): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r1}, &(0x7f0000000580), &(0x7f0000000540)}, 0x20) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x40) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) sendmsg$inet(r5, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r4, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRES64, @ANYRESDEC], 0xfdef) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc0189436, 0x20001412) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x2}, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_CREATE(0x0, 0x0, 0x0) 2.549268686s ago: executing program 9 (id=4995): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 2.548524026s ago: executing program 9 (id=4996): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001ec0)={&(0x7f00000005c0), 0x6e, &(0x7f0000001e00)=[{&(0x7f0000000640)=""/114, 0x72}, {&(0x7f00000007c0)=""/175, 0xaf}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000008c0)=""/99, 0x63}, {&(0x7f00000019c0)=""/181, 0xb5}, {&(0x7f0000001a80)=""/155, 0x9b}, {&(0x7f0000001b40)=""/162, 0xa2}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000001c00)=""/198, 0xc6}, {&(0x7f0000001d00)=""/195, 0xc3}], 0xa, &(0x7f0000000480)=[@cred={{0x1c}}], 0x20}, 0x20000000) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000001300180000001800000005000000000000000100000500000000020049f6a59000000000000000612e2e00"], 0x0, 0x35, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{0x1}, &(0x7f0000000280), &(0x7f00000002c0)='%pK \x00'}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r6, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)="f583f68a550609f21b23fe8dc431b7d59366456e", &(0x7f00000006c0)="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", 0xffffd6c0, r7}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) write$cgroup_pid(r5, &(0x7f0000000080), 0x12) 2.490792456s ago: executing program 5 (id=4997): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8920}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'netdevsim0\x00', 0x112}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xffd, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) write$cgroup_int(r1, &(0x7f0000000080)=0x6, 0x12) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16007400f89cff0100004900000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff0000005f7bcd225da511ff0007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x10000000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r3, @ANYRES32=r4, @ANYRES8=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='timer_start\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000140)={&(0x7f0000001140)="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", &(0x7f0000000580)=""/222, &(0x7f0000002140)="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", 0x0, 0x0, r3}, 0x38) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 2.423547757s ago: executing program 6 (id=4998): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff0000000000000048662331e1d80e2ee02020bfd741667f627012ff07a5c9a065971085d2ad70192e052831b2f80248712583e20e663a7f63a039add80a1377020871ac417ca5972508df4ce3fdbcac1916b404bfbb8e8a388a4f02e1", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x4000840) recvmsg$unix(r4, 0x0, 0x2020) r6 = gettid() perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa, 0xf7, 0x0, 0x5, 0x0, 0x4, 0x20, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000040), 0xa}, 0x8000, 0x4, 0xffff7fff, 0x4, 0x401, 0xfff, 0x4b, 0x0, 0x3, 0x0, 0x2}, r6, 0x1, 0xffffffffffffffff, 0x8) syz_open_procfs$namespace(r6, &(0x7f0000000400)='ns/time\x00') bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000081139000bfa30000000000000703000000feffff720af0fff8ffffff71a4f0ff0000000071106500000000001d300500000000004704000001ed00000f030000000000001d44020000000000620a00fe040400007203000000000000b500f7ff000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a8641aa05a1336b3b4c4becea710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fe51bef7af9aa0d7d600c095199fe3380d28e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51bf900000000000000d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343cccc953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93020000000000000080e69db384ac7eeedcf2ba3a9508f9d6aba582a896a9f1e096df6ecea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00e10000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d490cba8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e1461173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b583cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e80dc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6032399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c00000000000000f59dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ed1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67cf0216e2d81e6127bd9d7fab28800eaab2355992f8ce4cd38a"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb00de18000000000000100c0000000c7000000002f4ff000200b9badfea00de3ff8cd3c0e9ec2000000"], 0x0, 0x26, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.84794144s ago: executing program 5 (id=5000): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0xfe, 0x3, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000540)={&(0x7f0000000200)=@id, 0x10, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f00000005c0)={[{0x2d, 'memory'}, {0x0, 'rdma'}]}, 0xe) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xf000000}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xc, 0x9, 0x0, 0x0, 0x2}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x7}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x5, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000000000000071122b000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{0x7, 0x0, 0x10, 0x3}, {0x6}]}) 1.563236191s ago: executing program 8 (id=5002): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401, 0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000008000000020000000400000000000000fafed36b18708381d090ac883ea910396e5e9198e5a7a65e357ca7b9fe84a59a869d1e648f610d3eef4cd87bfef110566e258258b918066cd7ed8638b429ba3f770d08b4a3328427f7d7118ca048ab4186eb0e073ff5a0973cee474a6258a06bb09715926bb11ec45451ef02dcc36d43ea3927e7502b135241b15847f11ec27c277dc6e9e5806a8b05fedd38055b7802f8c54872a768a353f13220dae3a2e37c0e40b0ccfbe81df245fb469298d33e13e0d9dab8a3056d085a56f391180ecd4dc72abf0dd2654593d89b3370756768e2386a1bad986e", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r1}, &(0x7f0000000000), &(0x7f00000000c0)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r2, &(0x7f0000000580)="8b28a99cc07dc20277ef4444c9edf7469dcf58f44f21a3aca212e6a6ad46d96ab6ea2a109e18c2f47b718471571b8294074ee0256b07efa147191f90284681c77632dd50b3aacb7757f1e4"}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x109040, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xb8, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x10) close(r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r8, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0x66) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) 1.550100771s ago: executing program 7 (id=5003): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="0000becb22a80db836b48cbaf16f31048d673f915ac2b4bfd78d0c790ed9ca003bbdbc862328ad7b3e78c7bd998daa1a07d63a5514dc9668278de5a2990d32c5f2afa3cf5375675e5d3ad914e98c89a52395042436a84b8c51a047d87c49b75a8a1184c85e1a0f9710d6272bcf2e802293", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000000000000000181100", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x5, 0xc, &(0x7f00000005c0)=ANY=[@ANYRES32=r3, @ANYRES8=0x0, @ANYRES64, @ANYRES64, @ANYRES8=r1, @ANYRES16=r1, @ANYRES8=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000900000000000000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x10, &(0x7f00000005c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000702500000000002020207b1af8ff00000000bfa1000000000000070100ffffb702000008000000b70300"/66], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r7}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={r4, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb5, &(0x7f0000000cc0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000800), &(0x7f0000000d40), 0x8, 0xb6, 0x8, 0x8, &(0x7f0000000d80)}}, 0x10) (async, rerun: 64) sendmsg$inet(r9, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x20004804) (async, rerun: 64) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa}, 0x20) write$cgroup_int(r10, &(0x7f0000000200)=0x7, 0x12) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="1393bdd5b2005cebe800bba63cfcffce4ee3aa5a0aa2543af2c745a9b614d0a4145aea29683760e1ee34c3176494315fcb9b09859163edba3ee5cd4650d8a93c737eef2e7eedcea69dea80cf7754ad87e20e18ea2fc78251d68920fefbe9c3ad8b225cc5305d2470b3be7eb7194e9b03a813e23f7b191c124740166b68fd874ed004575b5572dd07888a9fd9a76bc67a059ebc63c4e3c9aaea00de6ca1c8d010582be85d45df6d921ff4ac749565531441afdfdbcbee2ecacdb751ad6ec8e091c057682cc47feb9ff419722922", @ANYRES32=r11, @ANYRES32=r10, @ANYBLOB="04000000030040000200"/28], 0x50) (async, rerun: 64) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (rerun: 64) write$cgroup_type(r12, &(0x7f0000000180), 0x40010) openat$cgroup_ro(r12, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x0, 0x0, 0x0, 0x90, 0x0, 0x200, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000000}, 0x12810, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.409744533s ago: executing program 9 (id=5004): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x102320}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r5], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r9}, 0x10) 1.394080562s ago: executing program 7 (id=5005): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000007000000050000000700000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x0, 0x0, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r5}, &(0x7f0000000040), 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7916009875f37515e486dd6317ce62030800000000000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) ioctl$SIOCSIFHWADDR(r4, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000030000000000000000000000850000008700000085000000050000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x46) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r1, &(0x7f00000004c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r1, 0x0, &(0x7f00000002c0)=""/26}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000cc0)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.281820343s ago: executing program 5 (id=5006): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="190000000400000004000000f307580751ff0280000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r3, 0x58, &(0x7f0000000a00)}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x10, &(0x7f0000000000), 0x4) sendmsg$inet(r6, &(0x7f0000002d40)={0x0, 0x0, 0x0}, 0x0) recvmsg(r5, &(0x7f0000002b00)={0xffffffffffffffff, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffc5}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) recvmsg(r7, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f00000006c0)=ANY=[@ANYBLOB="2b637075207a8dea94bc0d9b692e8fc083aab73c836d75fae1eb86ae6e8230f385f00f8758ab38f03e469511d26187b4904561f2bade08e1791e9b6660e7b00c7c2c7c95fbcfcd0810e8a8e03da843065d8da7a2ec086f41a406af92b2890f440545cf7c763612dee7a8c9bff7ae"], 0x5) write$cgroup_subtree(r9, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r9, &(0x7f0000000040)=ANY=[], 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="17000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001800"/28], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000004c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={&(0x7f0000000500)="09f5087213223e76f8898c8b5da94b93eed2d81b34a7a363b7e080522a3bc7af604f1856a1102da8e5a8e238af63031679d96ab7bd44812e28e18f52414e5dd2c280726961108ba51600d26e4f707cce4039b2ed21704ea8ba629af6535921c3a2916fb963ee819183b0fcee8458b6034e3f647cca8df9f063182663f9ee70870cf9", &(0x7f00000001c0)=""/100, &(0x7f00000003c0)="08f2201eebba5f7a9c9ab86a7449b6d97626083cb1f14c602c2ee56b355db89cf9ca86e99cd2ad02be94bc6028847c206c85820a6670089991461a9f422325e7d4d968825c7dd34d505636f3624a44de4e80f0147eef0959f501a9dcffd301104a920a638f0199959fe52fa767d4eea504ee145431ab034458d86c8bce587d", &(0x7f00000005c0)="54461ee9d7165c0f2533cbab644d28289bd493cf596232ff1329526fc41072e75f0d4aacf7b5ba6506a35aeea544a8601b77a6425a41360bbab0023d7d69530f131ecd4fb46376bb8d03fc5a1c5c1e28a67a896bb2b88ca063e21a137706df", 0x5, r0}, 0x38) 1.194754504s ago: executing program 6 (id=5007): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRES8, @ANYRESDEC, @ANYRES32=0x0, @ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x2}, 0x0, 0xdfffffffffffffff, r1, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x7, 0x4, 0x8, 0x463, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000700)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="1800ff8520000003000000181200000000000000000000000000ff00", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000"], 0x0, 0x2, 0x5a, &(0x7f0000000900)=""/90, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001140), 0x10, 0x7, @void, @value}, 0x94) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r2, 0x0, 0x0}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)) 1.175988373s ago: executing program 7 (id=5008): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="000000f34279e645765fa4"], 0x48) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2d, 'io'}, {0x2b, 'net_cls'}]}, 0xd) 1.128337154s ago: executing program 7 (id=5009): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000c40), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xd, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0, 0x9, 0x0, 0x0, 0x40f00, 0x26, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x4, 0x73, 0x7}, 0x10, 0x0, r5, 0x0, 0x0, &(0x7f00000003c0), 0x10, 0x10, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r10, 0x0, 0x66, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed", 0x0, 0xc, 0x0, 0x27, 0x0, &(0x7f0000000740)="63b96b1faa73d55df9a776bf16b982a3108eb83a0419f12545ab4981dad4e9c43fd9c182b50911", 0x0, 0x2, 0x0, 0x7f}, 0x50) write$cgroup_pid(r9, &(0x7f0000000880), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0400000004000000040000000000010000000000", @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00"/24], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRES8=r2, @ANYRESOCT=r3, @ANYBLOB="76caff9a12f39ec130b2153badbfa4907a7e9cad384bac4ddaf91835abed773ab62966cee4d87aa53f7f632b1bd5128e2a3835a4346edb851c4fd7b5dc46c113fb981c4349456888889252363e213d486e607c44fbfb1c6d03fd024166e1dcfbe66802a9ce3b36220b9a842322c3b7ce249e41d354fbfc9c29a40759e88372a139a67d16c7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r11}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x40000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.121112624s ago: executing program 9 (id=5010): socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) sendmsg$inet(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000340)="25b096f681cd731c3f3a9badc4e3cf5edeae1f3b5082d7ab3a97c053df68744e7c7e24d0b59997bab4bccff8363b275de3510b0ebe4275d8d2f153395668e3d608e358fc2294263c03f8dc4f8bf194e4fde4600a2dec2f483a914e2fde0cbc344a2b9fc18dd198966045a6d4d4eb8571e8bb69e6724e37fcbaa6e4c64050b47256b9bb17f5c0aa5101e015ecdcb62fec46fc0205512535", 0x97}, {&(0x7f0000000280)="d3a88bea5916e313729a3989393caca70c74cd74e62e524bdd37be131ad827f911027e70ccf679d8e7c0cd3333095f83d6d473db345ded2ac8acaa87503de74c82431758e8e11e3ecb7bce02d6cd65f4eb88cc49ceb9e39f7117eb0f62323dc9b80dea447b0c96a383f14281bb87b09de0a6153ceeaae2b50a2b0f0f41810f379f9c3a1f3938461829d716a4bda86ab11b41f754bc15d71b", 0xfed0}], 0x2}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000050001046c0000000040958d10000000000008080000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x1, &(0x7f0000000040)=@raw=[@generic={0xf7, 0x7, 0xb, 0x5, 0x41b1}], &(0x7f0000000280)='GPL\x00', 0x5, 0xa1, &(0x7f0000000340)=""/161, 0x40f00, 0xc, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0x10, 0x1, 0xfffffff7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[r6], &(0x7f0000000700)=[{0x1, 0x1, 0xb, 0x8}], 0x10, 0x3, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r8}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r8, &(0x7f0000000340)='\n', &(0x7f0000000380)=""/243}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x16, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, @map_fd={0x18, 0x8, 0x1, 0x0, r4}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000004c0)='GPL\x00', 0xe, 0x1000, &(0x7f0000000a40)=""/4096, 0x41100, 0x0, '\x00', r7, 0x25, r4, 0x8, &(0x7f0000000500)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xf, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r0, r4, r8, r0, r5, 0x1], 0x0, 0x10, 0x4, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r11}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=@framed={{0x46, 0xa, 0x0, 0x0, 0x0, 0x63, 0x11, 0x30}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1.069339304s ago: executing program 8 (id=5011): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) (async) close(r0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1.024897664s ago: executing program 8 (id=5012): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) close(0x3) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000", @ANYRES32, @ANYBLOB="0000000000000000000002000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad958500000003000000181100", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000fc0)={{}, 0x0, &(0x7f0000000f80)='%-010d \x00'}, 0x20) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) (async) ioctl$TUNSETOFFLOAD(r2, 0x4004743c, 0x40b942b37d0000) (async) close(0xffffffffffffffff) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1201, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'pim6reg\x00', 0x2000}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$tipc(r6, 0x0, 0x40) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x18) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.017144455s ago: executing program 5 (id=5013): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x2, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8b, 0x8b, 0x7, [@int={0xc, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x54, 0x2}, @type_tag={0x6, 0x0, 0x0, 0x12, 0x3}, @volatile={0x10, 0x0, 0x0, 0x9, 0x1}, @float={0x6, 0x0, 0x0, 0x10, 0x10}, @datasec={0x5, 0x6, 0x0, 0xf, 0x3, [{0x5, 0xffff, 0x6}, {0x5, 0x0, 0x80000000}, {0x3, 0x5, 0x2}, {0x1, 0x9}, {0x2, 0x3, 0x5}, {0x1, 0x8, 0x2}], "d7fd38"}]}, {0x0, [0x61, 0x0, 0x30, 0x2e, 0x2e]}}, &(0x7f0000000280)=""/226, 0xab, 0xe2, 0x1, 0x40, 0x10000, @value}, 0x28) bpf$TOKEN_CREATE(0x24, &(0x7f00000003c0)={0x0, r0}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe04000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x224f7d75, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) syz_clone(0x40000, &(0x7f0000000a40)="670c91eddff51fa993fc16172d5dacecdca56c69eb4f16a3da1d8f9f2c1605544ef211bcf40458c8ecb213e6c5d102e788bbe047671d9bdd1757c012d4051a519a30d3f1872635963f8db4e8080f51bd41b282c53e8d599b55cd588020bb25633c140537f352704ec0cfab69", 0x6c, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="f89e3da79b7a8ddd7d3c0bd76f4cf264554a80a4ed53c2a11afbf32e4c2fc4731b51d1e0b218a64fb8fcd6b7212362307b24ab1afb51a89d218f9bae2222c9c61dc346142fec79334edfaaaa38faf9bd934314ff9976ba99f0fba455354799e18b908afa4c31802090f0e004e8e38cfcfe987f099d714674382e2f5555c6f4ac95ac39d4cc3d63a924f300d3ae4620") socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r0, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0], 0x0, 0x61, &(0x7f0000000640)=[{}], 0x8, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0x26, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x17, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @cgroup_sysctl, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, r5, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 908.397045ms ago: executing program 8 (id=5014): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000c40), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xd, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0, 0x9, 0x0, 0x0, 0x40f00, 0x26, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x4, 0x73, 0x7}, 0x10, 0x0, r5, 0x0, 0x0, &(0x7f00000003c0), 0x10, 0x10, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r10, 0x0, 0x66, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed", 0x0, 0xc, 0x0, 0x27, 0x0, &(0x7f0000000740)="63b96b1faa73d55df9a776bf16b982a3108eb83a0419f12545ab4981dad4e9c43fd9c182b50911", 0x0, 0x2, 0x0, 0x7f}, 0x50) write$cgroup_pid(r9, &(0x7f0000000880), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0400000004000000040000000000010000000000", @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00"/24], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRES8=r2, @ANYRESOCT=r3, @ANYBLOB="76caff9a12f39ec130b2153badbfa4907a7e9cad384bac4ddaf91835abed773ab62966cee4d87aa53f7f632b1bd5128e2a3835a4346edb851c4fd7b5dc46c113fb981c4349456888889252363e213d486e607c44fbfb1c6d03fd024166e1dcfbe66802a9ce3b36220b9a842322c3b7ce249e41d354fbfc9c29a40759e88372a139a67d16c7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r11}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x40000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 907.851355ms ago: executing program 6 (id=5015): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3, 0x4, 0x7, 0xd1, 0x0, 0xfff, 0x8, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}, 0x110, 0x3ff, 0x80000000, 0x7, 0x0, 0x6, 0xb, 0x0, 0x10, 0x0, 0x44c2}, r1, 0x9, r0, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000f0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b700000004000000bc40feffff720af0ff0000000071a4f0ff000000001f030000000000002e0a0200000000002600000008ff000e61148c00000000001d430000000000007a0afffe00581c1f6114500000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58de361917adef6d21c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f30002af51efd601b6bf01c8e8b1fee5bef7af9aa0d7d6bfc8ef805c61ece8011317655b9c96fef05a02227be4c971a8556e5cde04b2b0579f95bf9cb1688de3de1ba4e7f73e0000000000000000000000000000000000002477a3947d60ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x2000000}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r5, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r4) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) (async) sendmsg$unix(r7, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r8], 0x18}, 0x0) (async) sendmsg$unix(r4, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) (async) close(r10) (async) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7c}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffff}, 0x0, 0xa, 0xffffffffffffffff, 0x0) (async) r11 = openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_devices(r11, &(0x7f0000000200)={'a', ' *:* ', 'rw\x00'}, 0x9) 773.467596ms ago: executing program 6 (id=5016): bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x13, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xfffffffffffffe06) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000002000000000000000000000000800000000000001b8de50d11b3d6a9239b0301050d74b8724e4b556d14477d4c32aa76006487f06b7e6f6ce9e290d4e8f62c6dd6011199a9cdf692b70434c53ba8588147228dce0c20fa77376bfa0eaaa2171d3c53e014a72ce0150cf73c228c56c259741ebb32a304d5f269835905c248e87f0003af164ad6e532f26f3644b12dd442021e6256aa407878a9572ab198b7dfd7550abfc2026bf36c4c7c1dfbeb447dfca6b1ee20abb83189c4c394a38c57dc264c5877b670e621a7"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x1, 0x1d1, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x8, 0x3, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffe00}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 673.251886ms ago: executing program 9 (id=5017): bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000610000003500000000000020a5000000050000009500000000000000f4670880271e3503200ffa95b2c8c037c5a142c9a8d76287066c51adde96fcc309926fa391b87b3e0cc7444a2391511c97fabd5f9810e81ae0b737136ea6f7be39cd34d5ae35de38dde54704d25c79949c00a7c09cc28d7673294f42a5f0a8761b30d64b741a226d67bad76402320e13822c45c0f861fbffb1f3c075ff3ebb755a2dd5760903000000000000006c6386d7ec7209d031f40f3012e9576e51a7f578602f5807785b92e544fc46c744aeeee4418d6af3e4195cc03710212436a4ff3274cac948d85cec074c6949e1298901ebb39522f6649dd76d067a82f5fe47fe5f17f99ab1e394ab800f4104dbffff0000000000de1b03a3e5cb56005c6d1d224b64be6c4d7f47ef21eb9006f9aa4a9779f8555eaea768c1f2c221c410ef4b253d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r5}, 0x10) unlink(&(0x7f0000000000)='./cgroup.cpu/cpuset.cpus/file0\x00') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000500)=""/92, 0x5c}], 0x1}, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 545.958327ms ago: executing program 6 (id=5018): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="8f", 0x1}], 0x1, &(0x7f0000002900)=ANY=[@ANYBLOB="14"], 0x18}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x22, &(0x7f00000000c0), 0x4) recvmsg(r3, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r0, 0x40047459, 0x37c4eebb97359361) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000660000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r5}, 0x10) close(0x3) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) openat$cgroup_procs(r6, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) 318.130378ms ago: executing program 7 (id=5019): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r2, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000002e00), &(0x7f0000000200), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11600, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000500)={'\x00', 0x2}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r5, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x5}, 0x9808, 0x14a, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0b00000004000000020000000400000000000000", @ANYRES32, @ANYBLOB="00000000000000000080006200718b0a365b7ee803fbca40c059e337c6ffec01f062d6ecc55932f936b202e6916f2ddfefd0bd9414982d7002d1caa05089a87066ebd09032ade8640d02a3396fe80b01595b8c122772e16ef966c760974da46da3393a8217671f325f09ead1e0b4e594743f01bb", @ANYRESOCT=r6, @ANYRES16=r7, @ANYRESDEC=r3], 0x48) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x5f, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa007", 0x0, 0x24, 0x60000000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xb, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000063013000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f00000002c0)=r6) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) 259.748419ms ago: executing program 9 (id=5020): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) 190.431979ms ago: executing program 8 (id=5021): r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c000000050000000400000009000000202c0000", @ANYRES32, @ANYBLOB="0300000000000000000000000000001b842f0700", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000050000000100"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000540), &(0x7f0000000600)=r0}, 0x20) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0xec, 0x0, 0x0, 0x0, 0x5, 0xa0211, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x0, 0x0, 0x0, 0x9, 0x6, 0x0, 0x0, 0x0, 0x23285ff0}, 0x0, 0xd, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000009500f10000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r4], 0x0, 0x6, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x25, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xd6, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0xe, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x54) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x1d, &(0x7f00000001c0), 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000006c0)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba880100000048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c27", 0x39}], 0x1}, 0x0) 41.92606ms ago: executing program 8 (id=5022): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x102d3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={0x0}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000500)="b74b7b94584d9b234970fa4be7fa75decb23d7e7ed8b6251db73bb8ee7d1bdef00e9f2941b956d39a493f7f3cf9c7c487e6a60364fe38c226ad5869154fd110fcf2b63ae5fc434cb9c9e2f9c23c153c463c78d72abcd305376bf8da06b26c33b7acef2eb6b6195b6488f784f044034dfdcf04732ce5a32aa9caead91aa9f47d497ec7821e6a3dd39182ffdbc02bbd3f41c8b70ae3f28ee4b931a0aac65a4dd5bd387a2bee2942bcdf0f0661843b6e3ff9e0f7207b285cbcc45b9a1b8e08606f6b736ae1a0f89d83b835c4e82e4e2601850d31502244baeedf0f5a548a65491fd09ff809c6b987bf4ffe90b73926352d8bb7c2887f3", &(0x7f0000000300)=""/57}, 0x20) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x2}, 0x40000100) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="1e030800dd5c9801288563a20dad001406"], 0xffdd) 21.78168ms ago: executing program 5 (id=5023): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) bpf$TOKEN_CREATE(0x24, &(0x7f0000000100)={0x0, r0}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffff7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000640)='hrtimer_start\x00', r4}, 0x10) (async, rerun: 64) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x4, '\x00', r5, r0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r8 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f00000005c0)={[{0x2b, 'rlimit'}, {0x2d, 'cpuset'}, {0x2d, 'hugetlb'}]}, 0x19) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='afs_cb_break\x00', r9, 0x0, 0xd}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="180800000000000000000000000000008510000003000000180000000000000000000000000000009500000000000000070000000000000095000000000000006f57d07dcb33816ac5cfa58bd3746311bd43ec3771305b4153"], &(0x7f0000000000)='GPL\x00', 0x6, 0xec, &(0x7f00000004c0)=""/236, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (rerun: 32) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) r12 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600), 0x2, 0x0) write$cgroup_subtree(r12, &(0x7f0000000640)={[{0x2b, 'devices'}]}, 0x9) 0s ago: executing program 6 (id=5024): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0a00000016000000b30000007f"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.82' (ED25519) to the list of known hosts. [ 20.943003][ T24] audit: type=1400 audit(1732128185.450:66): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.944278][ T273] cgroup: Unknown subsys name 'net' [ 20.965560][ T24] audit: type=1400 audit(1732128185.450:67): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.992445][ T24] audit: type=1400 audit(1732128185.480:68): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.992664][ T273] cgroup: Unknown subsys name 'devices' [ 21.131934][ T273] cgroup: Unknown subsys name 'hugetlb' [ 21.137374][ T273] cgroup: Unknown subsys name 'rlimit' [ 21.278632][ T24] audit: type=1400 audit(1732128185.780:69): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.301632][ T24] audit: type=1400 audit(1732128185.780:70): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.326235][ T24] audit: type=1400 audit(1732128185.780:71): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.333160][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.357847][ T24] audit: type=1400 audit(1732128185.860:72): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.383103][ T24] audit: type=1400 audit(1732128185.860:73): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.417910][ T24] audit: type=1400 audit(1732128185.920:74): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.443258][ T24] audit: type=1400 audit(1732128185.920:75): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.469234][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.994634][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.001967][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.009122][ T283] device bridge_slave_0 entered promiscuous mode [ 22.017346][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.024203][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.031437][ T283] device bridge_slave_1 entered promiscuous mode [ 22.053515][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.060426][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.067580][ T285] device bridge_slave_0 entered promiscuous mode [ 22.074777][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.081640][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.088891][ T285] device bridge_slave_1 entered promiscuous mode [ 22.135718][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.142638][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.149844][ T284] device bridge_slave_0 entered promiscuous mode [ 22.156809][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.163944][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.171227][ T284] device bridge_slave_1 entered promiscuous mode [ 22.230751][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.237609][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.245021][ T286] device bridge_slave_0 entered promiscuous mode [ 22.253159][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.260096][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.267183][ T286] device bridge_slave_1 entered promiscuous mode [ 22.273739][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.280620][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.287857][ T287] device bridge_slave_0 entered promiscuous mode [ 22.296496][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.303485][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.310742][ T287] device bridge_slave_1 entered promiscuous mode [ 22.413217][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.420078][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.427171][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.433974][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.446877][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.453738][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.460828][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.467631][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.495202][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.502108][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.509310][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.516137][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.524652][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.531505][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.538591][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.545410][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.559378][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.566250][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.573328][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.580265][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.597734][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.605029][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.612660][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.619669][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.626894][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.633905][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.641093][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.648063][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.655074][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.662071][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.669820][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.677345][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.698413][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.705817][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.713385][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.721622][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.728443][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.755517][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.763815][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.772107][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.778953][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.786486][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.794797][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.801655][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.808817][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.816989][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.823860][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.831027][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.838973][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.845830][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.854329][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.862374][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.869199][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.892993][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.900284][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.908211][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.915075][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.922609][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.930541][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.938381][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.946519][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.966372][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.974424][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.983426][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.990414][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.999275][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.007490][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.032660][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.041255][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.048961][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.057436][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.066848][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.075121][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.083348][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.091651][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.099812][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.106802][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.114057][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.122426][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.130527][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.137348][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.144648][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.152564][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.160531][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.168661][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.177035][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.184961][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.192954][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.201305][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.209048][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.216869][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.227644][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.235146][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.247439][ T285] device veth0_vlan entered promiscuous mode [ 23.256519][ T283] device veth0_vlan entered promiscuous mode [ 23.262863][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.270952][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.278634][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.286453][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.294512][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.302337][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.310318][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.317639][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.325178][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.332630][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.344057][ T284] device veth0_vlan entered promiscuous mode [ 23.355749][ T285] device veth1_macvtap entered promiscuous mode [ 23.364931][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.373049][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.382056][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.391141][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.399359][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.416987][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.425181][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.433464][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.441736][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.449839][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.458468][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.466709][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.474963][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.484676][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.492884][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.502179][ T284] device veth1_macvtap entered promiscuous mode [ 23.513213][ T287] device veth0_vlan entered promiscuous mode [ 23.522014][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.529625][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.537667][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.546228][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.553947][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.562568][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.570709][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.579749][ T283] device veth1_macvtap entered promiscuous mode [ 23.591848][ T286] device veth0_vlan entered promiscuous mode [ 23.598091][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.606023][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.613701][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.628107][ T285] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.639390][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.652344][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.661023][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.669490][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.678051][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.686273][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.706824][ T286] device veth1_macvtap entered promiscuous mode [ 23.714882][ T287] device veth1_macvtap entered promiscuous mode [ 23.726337][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.734013][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.743228][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.751975][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.760257][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.768457][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.777031][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.821243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.831579][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.839834][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.848569][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.857470][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.866061][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.874637][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.875615][ C0] hrtimer: interrupt took 26449 ns [ 23.883140][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.212267][ T319] cgroup: syz.0.1 (319) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 24.229232][ T319] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 24.275335][ T318] device syzkaller0 entered promiscuous mode [ 25.070117][ T347] device pim6reg1 entered promiscuous mode [ 25.751643][ T371] device syzkaller0 entered promiscuous mode [ 25.841947][ T363] GPL: port 1(erspan0) entered blocking state [ 25.848432][ T363] GPL: port 1(erspan0) entered disabled state [ 25.874327][ T363] device erspan0 entered promiscuous mode [ 25.900716][ T376] GPL: port 1(erspan0) entered blocking state [ 25.906616][ T376] GPL: port 1(erspan0) entered forwarding state [ 26.543672][ T24] kauditd_printk_skb: 44 callbacks suppressed [ 26.543685][ T24] audit: type=1400 audit(1732128191.050:120): avc: denied { write } for pid=393 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.629414][ T24] audit: type=1400 audit(1732128191.070:121): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 26.967223][ T24] audit: type=1400 audit(1732128191.450:122): avc: denied { create } for pid=402 comm="syz.4.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 27.241537][ T24] audit: type=1400 audit(1732128191.750:123): avc: denied { create } for pid=414 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.410860][ T415] device pim6reg1 entered promiscuous mode [ 27.512184][ T24] audit: type=1400 audit(1732128191.790:124): avc: denied { write } for pid=414 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.740538][ T24] audit: type=1400 audit(1732128191.790:125): avc: denied { read } for pid=414 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.771865][ T24] audit: type=1400 audit(1732128191.840:126): avc: denied { create } for pid=418 comm="syz.4.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 27.850654][ T24] audit: type=1400 audit(1732128192.280:127): avc: denied { read } for pid=424 comm="syz.4.32" name="ppp" dev="devtmpfs" ino=148 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.110580][ T24] audit: type=1400 audit(1732128192.280:128): avc: denied { open } for pid=424 comm="syz.4.32" path="/dev/ppp" dev="devtmpfs" ino=148 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.448938][ T24] audit: type=1400 audit(1732128192.280:129): avc: denied { ioctl } for pid=424 comm="syz.4.32" path="/dev/ppp" dev="devtmpfs" ino=148 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.856080][ T457] tap0: tun_chr_ioctl cmd 1074812118 [ 29.191587][ T474] syz.3.45[474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.191642][ T474] syz.3.45[474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.890981][ T499] device veth1_macvtap left promiscuous mode [ 30.650757][ T531] device pim6reg1 entered promiscuous mode [ 30.747607][ T543] syz.3.66[543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.747663][ T543] syz.3.66[543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.452585][ T559] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 31.512456][ T559] device syzkaller0 entered promiscuous mode [ 31.864098][ T24] kauditd_printk_skb: 4 callbacks suppressed [ 31.864112][ T24] audit: type=1400 audit(1732128196.370:134): avc: denied { ioctl } for pid=571 comm="syz.3.77" path="socket:[15331]" dev="sockfs" ino=15331 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.086248][ T582] FAULT_INJECTION: forcing a failure. [ 32.086248][ T582] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 32.234313][ T582] CPU: 1 PID: 582 Comm: syz.1.80 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 32.243853][ T582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 32.253954][ T582] Call Trace: [ 32.257091][ T582] dump_stack_lvl+0x1e2/0x24b [ 32.261589][ T582] ? bfq_pos_tree_add_move+0x43b/0x43b [ 32.266993][ T582] dump_stack+0x15/0x17 [ 32.271001][ T582] should_fail+0x3c6/0x510 [ 32.275241][ T582] should_fail_usercopy+0x1a/0x20 [ 32.280091][ T582] _copy_to_user+0x20/0x90 [ 32.284345][ T582] simple_read_from_buffer+0xc7/0x150 [ 32.289550][ T582] proc_fail_nth_read+0x1a3/0x210 [ 32.294438][ T582] ? proc_fault_inject_write+0x390/0x390 [ 32.299913][ T582] ? security_file_permission+0x86/0xb0 [ 32.305265][ T582] ? rw_verify_area+0x1c3/0x360 [ 32.310142][ T582] ? proc_fault_inject_write+0x390/0x390 [ 32.315602][ T582] vfs_read+0x200/0xba0 [ 32.319609][ T582] ? __fd_install+0x11e/0x220 [ 32.324132][ T582] ? kernel_read+0x70/0x70 [ 32.328362][ T582] ? __kasan_check_write+0x14/0x20 [ 32.333422][ T582] ? mutex_lock+0xa5/0x110 [ 32.337701][ T582] ? mutex_trylock+0xa0/0xa0 [ 32.342089][ T582] ? __fdget_pos+0x2e7/0x3a0 [ 32.346512][ T582] ? ksys_read+0x77/0x2c0 [ 32.350680][ T582] ksys_read+0x199/0x2c0 [ 32.354760][ T582] ? vfs_write+0xe70/0xe70 [ 32.359020][ T582] ? debug_smp_processor_id+0x17/0x20 [ 32.364229][ T582] __x64_sys_read+0x7b/0x90 [ 32.368558][ T582] do_syscall_64+0x34/0x70 [ 32.372910][ T582] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 32.378640][ T582] RIP: 0033:0x7f8228e3225c [ 32.382882][ T582] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 32.402415][ T582] RSP: 002b:00007f82274ac030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 32.410671][ T582] RAX: ffffffffffffffda RBX: 00007f8228feafa0 RCX: 00007f8228e3225c [ 32.418553][ T582] RDX: 000000000000000f RSI: 00007f82274ac0a0 RDI: 0000000000000009 [ 32.426364][ T582] RBP: 00007f82274ac090 R08: 0000000000000000 R09: 0000000000000000 [ 32.434180][ T582] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 32.442082][ T582] R13: 0000000000000000 R14: 00007f8228feafa0 R15: 00007ffd88041dd8 [ 32.461915][ T579] device wg2 entered promiscuous mode [ 32.975909][ T24] audit: type=1400 audit(1732128197.480:135): avc: denied { cpu } for pid=587 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.478604][ T24] audit: type=1400 audit(1732128197.980:136): avc: denied { create } for pid=607 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 33.614646][ T617] device pim6reg1 entered promiscuous mode [ 34.265674][ T24] audit: type=1400 audit(1732128198.770:137): avc: denied { create } for pid=631 comm="syz.3.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 34.579591][ T655] device syzkaller0 entered promiscuous mode [ 34.677850][ T24] audit: type=1400 audit(1732128199.180:138): avc: denied { ioctl } for pid=654 comm="syz.0.102" path="net:[4026532286]" dev="nsfs" ino=4026532286 ioctlcmd=0x5828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 34.964780][ T24] audit: type=1400 audit(1732128199.470:139): avc: denied { write } for pid=647 comm="syz.2.101" name="cgroup.subtree_control" dev="cgroup2" ino=185 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 35.134075][ T24] audit: type=1400 audit(1732128199.470:140): avc: denied { open } for pid=647 comm="syz.2.101" path="" dev="cgroup2" ino=185 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 35.424839][ T699] device pim6reg1 entered promiscuous mode [ 35.746926][ T708] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 35.760071][ T708] pim6reg0: linktype set to 776 [ 36.558301][ T747] device wg2 left promiscuous mode [ 36.669454][ T24] audit: type=1400 audit(1732128201.170:141): avc: denied { create } for pid=755 comm="syz.3.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 36.693786][ T752] device wg2 entered promiscuous mode [ 36.755253][ T766] €Т0: renamed from pim6reg1 [ 36.783538][ T768] device pim6reg1 entered promiscuous mode [ 36.814678][ T760] device veth1_macvtap left promiscuous mode [ 36.928855][ T775] device veth1_macvtap entered promiscuous mode [ 36.967723][ T775] device macsec0 entered promiscuous mode [ 37.983245][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 38.038245][ T24] audit: type=1400 audit(1732128202.540:142): avc: denied { create } for pid=840 comm="syz.4.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 38.113335][ T849] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.127322][ T849] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.134277][ T849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.661992][ T24] audit: type=1400 audit(1732128204.170:143): avc: denied { create } for pid=889 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 41.169191][ T955] device pim6reg1 entered promiscuous mode [ 42.642326][ T1023] tap0: tun_chr_ioctl cmd 2148553947 [ 42.665639][ T24] audit: type=1400 audit(1732128207.170:144): avc: denied { create } for pid=1027 comm="syz.0.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 43.191224][ T1043] device syzkaller0 entered promiscuous mode [ 43.267866][ T1045] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.275139][ T1045] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.319846][ T1048] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.326809][ T1048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.333943][ T1048] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.340802][ T1048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.406863][ T1048] device bridge0 entered promiscuous mode [ 43.581565][ T1061] syz.3.221 uses obsolete (PF_INET,SOCK_PACKET) [ 43.611608][ T24] audit: type=1400 audit(1732128208.120:145): avc: denied { create } for pid=1053 comm="syz.3.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 43.743118][ T1065] device syzkaller0 entered promiscuous mode [ 44.517661][ T24] audit: type=1400 audit(1732128209.020:146): avc: denied { create } for pid=1087 comm="syz.4.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 44.606691][ T1093] syz.3.231[1093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.606753][ T1093] syz.3.231[1093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.627667][ T1096] device syzkaller0 entered promiscuous mode [ 45.285667][ T24] audit: type=1400 audit(1732128209.790:147): avc: denied { create } for pid=1123 comm="syz.1.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 45.961733][ T1170] device syzkaller0 entered promiscuous mode [ 46.854377][ T1215] device wg2 entered promiscuous mode [ 49.227740][ T1275] device syzkaller0 entered promiscuous mode [ 49.494694][ T1283] device pim6reg1 entered promiscuous mode [ 49.910541][ T1315] device veth0_vlan left promiscuous mode [ 49.921895][ T1315] device veth0_vlan entered promiscuous mode [ 50.203348][ T1336] -: renamed from syzkaller0 [ 50.752606][ T1347] device veth0_vlan left promiscuous mode [ 50.773422][ T1347] device veth0_vlan entered promiscuous mode [ 51.380886][ T1380] device pim6reg1 entered promiscuous mode [ 51.506197][ T1393] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.513217][ T1393] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.671288][ T1390] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.678392][ T1390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.689171][ T1390] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.697104][ T1390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.707608][ T1390] device bridge0 entered promiscuous mode [ 51.974127][ T1401] device syzkaller0 entered promiscuous mode [ 52.306066][ T24] audit: type=1400 audit(1732128216.800:148): avc: denied { create } for pid=1423 comm="syz.0.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 53.393422][ T24] audit: type=1400 audit(1732128217.890:149): avc: denied { create } for pid=1492 comm="syz.4.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 54.281935][ T24] audit: type=1400 audit(1732128218.790:150): avc: denied { create } for pid=1522 comm="syz.3.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 54.762561][ T1548] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.786821][ T1536] device veth1_macvtap left promiscuous mode [ 54.846122][ T1536] device macsec0 entered promiscuous mode [ 54.890524][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.899032][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.905934][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.956044][ T1559] device pim6reg1 entered promiscuous mode [ 55.054702][ T1567] device syzkaller0 entered promiscuous mode [ 56.195841][ T1614] device syzkaller0 entered promiscuous mode [ 56.228208][ T1621] syz.4.387[1621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.228309][ T1621] syz.4.387[1621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.301226][ T1621] syz.4.387[1621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.316585][ T1621] syz.4.387[1621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.675797][ T1647] device pim6reg1 entered promiscuous mode [ 57.367418][ T1679] syz.4.406[1679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.367475][ T1679] syz.4.406[1679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.655374][ T1697] tap0: tun_chr_ioctl cmd 1074812117 [ 57.900977][ T1691] device syzkaller0 entered promiscuous mode [ 58.236089][ T1731] device pim6reg1 entered promiscuous mode [ 58.398211][ T1742] syz.1.427 (1742) used obsolete PPPIOCDETACH ioctl [ 58.675356][ T1754] device syzkaller0 entered promiscuous mode [ 59.123889][ T1799] syz.4.443[1799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.123944][ T1799] syz.4.443[1799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.386717][ T1817] device pim6reg1 entered promiscuous mode [ 59.524617][ T1826] device pim6reg1 entered promiscuous mode [ 59.779061][ T24] audit: type=1400 audit(1732128224.280:151): avc: denied { create } for pid=1852 comm="syz.2.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 60.844320][ T1900] device veth1_macvtap left promiscuous mode [ 60.850973][ T1900] device macsec0 left promiscuous mode [ 61.034280][ T1920] device pim6reg1 entered promiscuous mode [ 61.183255][ T1931] device sit0 entered promiscuous mode [ 61.718920][ T1961] device syzkaller0 entered promiscuous mode [ 62.284349][ T1985] device pim6reg1 entered promiscuous mode [ 62.321182][ T1989] device pim6reg1 entered promiscuous mode [ 63.192882][ T2041] device syzkaller0 entered promiscuous mode [ 64.114485][ T2083] device wg2 entered promiscuous mode [ 64.770377][ T2107] device syzkaller0 entered promiscuous mode [ 65.072063][ T2120] syz.3.539[2120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.072118][ T2120] syz.3.539[2120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.248885][ T2125] device veth0_vlan left promiscuous mode [ 65.313361][ T2125] device veth0_vlan entered promiscuous mode [ 65.375287][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.383630][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 65.393877][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.670487][ T2145] device sit0 entered promiscuous mode [ 68.194909][ T2253] device pim6reg1 entered promiscuous mode [ 68.286775][ T2253] device veth0_vlan left promiscuous mode [ 68.309817][ T2253] device veth0_vlan entered promiscuous mode [ 70.688345][ T2369] device syzkaller0 entered promiscuous mode [ 71.187624][ T2401] device syzkaller0 entered promiscuous mode [ 71.215078][ T2402] device pim6reg1 entered promiscuous mode [ 71.712444][ T2438] device sit0 left promiscuous mode [ 71.894520][ T2456] device GPL entered promiscuous mode [ 72.197638][ T2474] device syzkaller0 entered promiscuous mode [ 72.880192][ T2497] tun0: tun_chr_ioctl cmd 1074025675 [ 72.887676][ T2497] tun0: persist enabled [ 72.900171][ T2497] tun0: tun_chr_ioctl cmd 1074025675 [ 72.910034][ T2497] tun0: persist disabled [ 73.499519][ T2525] device pim6reg1 entered promiscuous mode [ 73.875865][ T2528] pim6reg0: tun_chr_ioctl cmd 1074025698 [ 73.995019][ T2547] device pim6reg1 entered promiscuous mode [ 74.181076][ T2552] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.190086][ T2552] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.206524][ T2552] device bridge0 left promiscuous mode [ 74.314141][ T2560] device bridge_slave_1 left promiscuous mode [ 74.320595][ T2560] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.362844][ T2560] device bridge_slave_0 left promiscuous mode [ 74.376206][ T2560] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.552935][ T2577] device syzkaller0 entered promiscuous mode [ 74.584788][ T2586] device pim6reg1 entered promiscuous mode [ 75.332766][ T2614] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 75.469480][ T2614] device syzkaller0 entered promiscuous mode [ 75.551630][ T2616] syz.1.689[2616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.551687][ T2616] syz.1.689[2616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.953875][ T2634] device pim6reg1 entered promiscuous mode [ 76.172013][ T2655] ------------[ cut here ]------------ [ 76.177304][ T2655] trace type BPF program uses run-time allocation [ 76.200164][ T2655] WARNING: CPU: 1 PID: 2655 at kernel/bpf/verifier.c:10493 check_map_prog_compatibility+0x65b/0x7c0 [ 76.214655][ T2655] Modules linked in: [ 76.218403][ T2655] CPU: 1 PID: 2655 Comm: syz.3.702 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 76.228252][ T2655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 76.259416][ T2655] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 76.287965][ T2655] Code: c8 e9 84 fe ff ff e8 34 f4 ee ff 31 db e9 85 fe ff ff e8 28 f4 ee ff c6 05 0e 1d 65 05 01 48 c7 c7 e0 76 45 85 e8 15 7a c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 76.350698][ T2655] RSP: 0018:ffffc900013a6f90 EFLAGS: 00010246 [ 76.367037][ T2655] RAX: fc2038e7e24c3700 RBX: ffff888119482000 RCX: ffff888117134f00 [ 76.376519][ T2655] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 76.424546][ T2663] Т: renamed from pim6reg1 [ 76.480146][ T2655] RBP: ffffc900013a6fd0 R08: ffffffff81522098 R09: ffffed103ee2a5f8 [ 76.488440][ T2655] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 76.550088][ T2655] R13: 1ffff9200002bc04 R14: ffff8881176b8000 R15: ffffc9000015e020 [ 76.557997][ T2655] FS: 00007f78c56c76c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 76.566819][ T2655] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 76.573332][ T2655] CR2: 00007f76ce19cd58 CR3: 0000000129fb9000 CR4: 00000000003506b0 [ 76.582470][ T2655] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 76.590518][ T2655] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 76.598395][ T2655] Call Trace: [ 76.601721][ T2655] ? show_regs+0x58/0x60 [ 76.605836][ T2655] ? __warn+0x160/0x2f0 [ 76.609870][ T2655] ? check_map_prog_compatibility+0x65b/0x7c0 [ 76.616042][ T2655] ? report_bug+0x3d9/0x5b0 [ 76.620727][ T2655] ? check_map_prog_compatibility+0x65b/0x7c0 [ 76.626700][ T2655] ? handle_bug+0x41/0x70 [ 76.631137][ T2655] ? exc_invalid_op+0x1b/0x50 [ 76.636169][ T2655] ? asm_exc_invalid_op+0x12/0x20 [ 76.653389][ T2655] ? wake_up_klogd+0xb8/0xf0 [ 76.665580][ T2655] ? check_map_prog_compatibility+0x65b/0x7c0 [ 76.687371][ T2655] ? __fdget+0x1bc/0x240 [ 76.700096][ T2655] resolve_pseudo_ldimm64+0x586/0x1020 [ 76.715599][ T2655] ? bpf_check+0xf2b0/0xf2b0 [ 76.731164][ T2655] ? kvmalloc_node+0x82/0x130 [ 76.744570][ T2655] bpf_check+0xaf21/0xf2b0 [ 76.763098][ T2655] ? stack_depot_save+0xe/0x10 [ 76.782203][ T2655] ? __se_sys_bpf+0x9856/0x11cb0 [ 76.840135][ T2655] ? sched_clock+0x3a/0x40 [ 76.868853][ T2655] ? bpf_get_btf_vmlinux+0x60/0x60 [ 76.885927][ T2655] ? __kernel_text_address+0x9b/0x110 [ 76.910162][ T2695] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 76.918724][ T2655] ? unwind_get_return_address+0x4d/0x90 [ 76.934384][ T2655] ? arch_stack_walk+0xf3/0x140 [ 76.958114][ T2655] ? stack_trace_save+0x113/0x1c0 [ 76.972693][ T2655] ? stack_trace_snprint+0xf0/0xf0 [ 76.990042][ T2655] ? stack_trace_snprint+0xf0/0xf0 [ 76.995013][ T2655] ? selinux_bpf_prog_alloc+0x51/0x140 [ 77.008791][ T2655] ? selinux_bpf_prog_alloc+0x51/0x140 [ 77.018854][ T2655] ? ____kasan_kmalloc+0xed/0x110 [ 77.050133][ T2655] ? ____kasan_kmalloc+0xdb/0x110 [ 77.070073][ T2655] ? __kasan_kmalloc+0x9/0x10 [ 77.100454][ T2655] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 77.155430][ T2655] ? selinux_bpf_prog_alloc+0x51/0x140 [ 77.199794][ T2706] device syzkaller0 entered promiscuous mode [ 77.206749][ T2655] ? security_bpf_prog_alloc+0x62/0x90 [ 77.270685][ T2655] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 77.290468][ T2655] ? __x64_sys_bpf+0x7b/0x90 [ 77.295063][ T2655] ? do_syscall_64+0x34/0x70 [ 77.340276][ T2655] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 77.401560][ T2655] ? __kasan_kmalloc+0x9/0x10 [ 77.442906][ T2655] __se_sys_bpf+0x107a2/0x11cb0 [ 77.451577][ T2655] ? futex_wait+0x6a0/0x7c0 [ 77.455918][ T2655] ? __x64_sys_bpf+0x90/0x90 [ 77.499622][ T2655] ? do_futex+0x17b0/0x17b0 [ 77.528730][ T2655] ? slab_post_alloc_hook+0x80/0x2f0 [ 77.540134][ T2655] ? do_futex+0x139a/0x17b0 [ 77.545123][ T2655] ? percpu_counter_add_batch+0x13d/0x160 [ 77.604745][ T2655] ? alloc_file+0x83/0x4e0 [ 77.640752][ T2655] ? memcpy+0x56/0x70 [ 77.678867][ T2655] ? errseq_sample+0x44/0x70 [ 77.719228][ T2655] ? futex_exit_release+0x1e0/0x1e0 [ 77.720313][ T24] audit: type=1400 audit(1732128242.220:152): avc: denied { append } for pid=2725 comm="syz.4.722" name="ppp" dev="devtmpfs" ino=148 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 77.747000][ T2655] ? alloc_file_pseudo+0x280/0x2f0 [ 77.782349][ T2655] ? local_bh_enable+0x1f/0x30 [ 77.786950][ T2655] ? alloc_empty_file_noaccount+0x80/0x80 [ 77.885977][ T2655] ? put_pid+0xc3/0x110 [ 77.931020][ T2655] ? __se_sys_futex+0x355/0x470 [ 77.935729][ T2655] ? fpu__clear_all+0x20/0x20 [ 77.980179][ T2655] ? __kasan_check_read+0x11/0x20 [ 78.026825][ T2655] __x64_sys_bpf+0x7b/0x90 [ 78.037070][ T2655] do_syscall_64+0x34/0x70 [ 78.041645][ T2655] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 78.048815][ T2655] RIP: 0033:0x7f78c704e819 [ 78.063728][ T2655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.123540][ T2655] RSP: 002b:00007f78c56c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 78.150020][ T2655] RAX: ffffffffffffffda RBX: 00007f78c7205fa0 RCX: 00007f78c704e819 [ 78.167999][ T2655] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 78.188814][ T2655] RBP: 00007f78c70c175e R08: 0000000000000000 R09: 0000000000000000 [ 78.209017][ T2655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 78.222015][ T2655] R13: 0000000000000000 R14: 00007f78c7205fa0 R15: 00007ffcfd5ee578 [ 78.260128][ T2655] ---[ end trace 35ce13943396af18 ]--- [ 78.535681][ T2762] device pim6reg1 entered promiscuous mode [ 79.664082][ T2803] device pim6reg1 entered promiscuous mode [ 80.724145][ T2826] device veth1_macvtap entered promiscuous mode [ 80.796907][ T2826] device macsec0 entered promiscuous mode [ 80.902553][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 81.034538][ T2842] device pim6reg1 entered promiscuous mode [ 81.218822][ T2846] device syzkaller0 entered promiscuous mode [ 83.955570][ T2908] syz.2.771[2908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.955625][ T2908] syz.2.771[2908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.696980][ T2920] syz.3.774[2920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.830107][ T2920] syz.3.774[2920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.726359][ T2952] tap0: tun_chr_ioctl cmd 1074812118 [ 85.743781][ T24] audit: type=1400 audit(1732128250.250:153): avc: denied { create } for pid=2949 comm="syz.1.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 87.909779][ T3002] device sit0 entered promiscuous mode [ 88.341031][ T3022] syz.3.800[3022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.341090][ T3022] syz.3.800[3022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.406004][ T3012] device pim6reg1 entered promiscuous mode [ 88.461158][ T3012] syz.3.800[3012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.461216][ T3012] syz.3.800[3012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.129214][ T24] audit: type=1400 audit(1732128253.630:154): avc: denied { create } for pid=3055 comm="syz.3.811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 89.337676][ T24] audit: type=1400 audit(1732128253.730:155): avc: denied { create } for pid=3064 comm="syz.0.813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 90.120508][ T3116] cgroup: fork rejected by pids controller in /syz0 [ 90.773339][ T3141] device veth0_vlan left promiscuous mode [ 90.827208][ T3141] device veth0_vlan entered promiscuous mode [ 91.387647][ T3147] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.406991][ T3147] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.414641][ T3147] device bridge_slave_0 entered promiscuous mode [ 91.425027][ T3147] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.432171][ T3147] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.439519][ T3147] device bridge_slave_1 entered promiscuous mode [ 91.561986][ T7] device bridge_slave_1 left promiscuous mode [ 91.567955][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.714479][ T7] device bridge_slave_0 left promiscuous mode [ 91.778918][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.098286][ T3183] device macsec0 entered promiscuous mode [ 92.190943][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 92.322371][ T3193] device syzkaller0 entered promiscuous mode [ 92.410083][ T24] audit: type=1400 audit(1732128256.910:156): avc: denied { create } for pid=3147 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 92.568682][ T24] audit: type=1400 audit(1732128256.910:157): avc: denied { write } for pid=3147 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 92.599914][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.620756][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.684185][ T3216] syz.1.854[3216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.684241][ T3216] syz.1.854[3216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.700703][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.760578][ T24] audit: type=1400 audit(1732128256.910:158): avc: denied { read } for pid=3147 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 92.853371][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.861920][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.868803][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.876425][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.887556][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.927712][ T24] audit: type=1400 audit(1732128257.030:159): avc: denied { create } for pid=3211 comm="syz.2.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 92.947953][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.954853][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.019883][ T24] audit: type=1400 audit(1732128257.100:160): avc: denied { append } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 93.101726][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.109586][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.117883][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.134857][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 93.152207][ T24] audit: type=1400 audit(1732128257.100:161): avc: denied { open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 93.179373][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 93.203187][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 93.211047][ T24] audit: type=1400 audit(1732128257.100:162): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 93.234089][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.242418][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.249918][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.257251][ T24] audit: type=1400 audit(1732128257.410:163): avc: denied { remove_name } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 93.285944][ T3147] device veth0_vlan entered promiscuous mode [ 93.298391][ T24] audit: type=1400 audit(1732128257.410:164): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 93.322623][ T3147] device veth1_macvtap entered promiscuous mode [ 93.338637][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 93.350964][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.370634][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 93.382829][ T24] audit: type=1400 audit(1732128257.410:165): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 93.431068][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 93.452092][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 93.480659][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 93.581048][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 93.774864][ T3250] device vxcan1 entered promiscuous mode [ 94.358505][ T3276] device syzkaller0 entered promiscuous mode [ 95.502962][ T3333] syz.1.884[3333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.503018][ T3333] syz.1.884[3333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.979281][ T3360] device pim6reg1 entered promiscuous mode [ 96.400377][ T3384] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 96.444498][ T3384] pim6reg0: linktype set to 0 [ 97.475433][ T3410] device wg2 entered promiscuous mode [ 97.970194][ T3428] syz.0.911[3428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.970252][ T3428] syz.0.911[3428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.991178][ T3428] device pim6reg1 entered promiscuous mode [ 98.042485][ T3429] syz.0.911[3429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.042542][ T3429] syz.0.911[3429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.315152][ T3433] device syzkaller0 entered promiscuous mode [ 98.374661][ T3433] €Т0: renamed from pim6reg1 [ 98.597430][ T3456] device pim6reg1 entered promiscuous mode [ 99.916957][ T3509] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 99.926896][ T3509] device syzkaller0 entered promiscuous mode [ 99.995454][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 99.995467][ T24] audit: type=1400 audit(1732128264.500:167): avc: denied { create } for pid=3507 comm="syz.4.939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 101.507432][ T3606] syz.1.965[3606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.507489][ T3606] syz.1.965[3606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.693227][ T3606] syz.1.965[3606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.716782][ T3615] device pim6reg1 entered promiscuous mode [ 101.753418][ T3614] device veth0_vlan left promiscuous mode [ 101.782985][ T3614] device veth0_vlan entered promiscuous mode [ 101.811104][ T3606] syz.1.965[3606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.833629][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.910761][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.942930][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.755755][ T3660] device pim6reg1 entered promiscuous mode [ 102.868628][ T3703] syz.4.985[3703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.868689][ T3703] syz.4.985[3703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.906655][ T3703] device pim6reg1 entered promiscuous mode [ 103.317598][ T3729] device pim6reg1 entered promiscuous mode [ 103.361119][ T3727] џџџџџџ: renamed from vlan1 [ 103.667101][ T3752] bpf_get_probe_write_proto: 2 callbacks suppressed [ 103.667112][ T3752] syz.1.998[3752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.739724][ T3752] syz.1.998[3752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.775125][ T3754] device veth0_vlan left promiscuous mode [ 103.809773][ T3754] device veth0_vlan entered promiscuous mode [ 103.845489][ T3768] syz.1.998[3768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.845555][ T3768] syz.1.998[3768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.900466][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.925848][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.944967][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.966354][ T3760] device pim6reg1 entered promiscuous mode [ 104.177534][ T3784] device syzkaller0 entered promiscuous mode [ 105.831098][ T3855] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.536719][ T3902] device macsec0 left promiscuous mode [ 107.950384][ T3916] device syzkaller0 entered promiscuous mode [ 108.311555][ T3928] device pim6reg1 entered promiscuous mode [ 109.490724][ T3960] device syzkaller0 entered promiscuous mode [ 109.908823][ T4009] device veth0_vlan left promiscuous mode [ 109.951439][ T4009] device veth0_vlan entered promiscuous mode [ 111.415997][ T4070] device wg2 left promiscuous mode [ 111.818420][ T4070] device syzkaller0 entered promiscuous mode [ 111.862694][ T4074] device veth0_vlan left promiscuous mode [ 111.873004][ T4074] device veth0_vlan entered promiscuous mode [ 111.927045][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.940761][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.949693][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.134790][ T4142] device pim6reg1 entered promiscuous mode [ 114.235099][ T4150] device veth0_vlan left promiscuous mode [ 114.267583][ T4150] device veth0_vlan entered promiscuous mode [ 114.330719][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.340732][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.366711][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.020023][ T4191] device pim6reg1 entered promiscuous mode [ 115.413335][ T4213] device wg2 entered promiscuous mode [ 116.469430][ T4248] device wg2 left promiscuous mode [ 116.587239][ T4252] device wg2 entered promiscuous mode [ 117.187941][ T4291] device pim6reg1 entered promiscuous mode [ 117.457937][ T4299] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 117.467774][ T4299] dvmrp1: linktype set to 768 [ 117.478237][ T4299] dvmrp1: tun_chr_ioctl cmd 35108 [ 118.789643][ T4332] device pim6reg1 entered promiscuous mode [ 119.031383][ T4350] device macsec0 left promiscuous mode [ 119.053994][ T4352] device veth1_macvtap entered promiscuous mode [ 119.120057][ T4352] device macsec0 entered promiscuous mode [ 119.128263][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 119.653550][ T24] audit: type=1400 audit(1732128284.160:168): avc: denied { create } for pid=4375 comm="syz.4.1187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 119.944870][ T4385] device syzkaller0 entered promiscuous mode [ 120.291873][ T4415] syz.2.1199[4415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.291945][ T4415] syz.2.1199[4415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.849232][ T24] audit: type=1400 audit(1732128286.350:169): avc: denied { create } for pid=4461 comm="syz.4.1215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 122.161621][ T4474] device veth1_macvtap left promiscuous mode [ 122.479604][ T4485] device veth0_vlan left promiscuous mode [ 122.580739][ T4485] device veth0_vlan entered promiscuous mode [ 122.682631][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.723322][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 122.795329][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 123.154516][ T4507] device pim6reg1 entered promiscuous mode [ 123.476929][ T4520] syz.2.1231[4520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.476985][ T4520] syz.2.1231[4520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.498710][ T4519] tap0: tun_chr_ioctl cmd 1074025677 [ 123.525288][ T4519] tap0: linktype set to 825 [ 123.777773][ T4531] device wg2 entered promiscuous mode [ 124.045019][ T4548] syz.3.1242[4548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.045076][ T4548] syz.3.1242[4548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.228546][ T4553] device sit0 entered promiscuous mode [ 124.645282][ T4565] tun0: tun_chr_ioctl cmd 1074025678 [ 124.650555][ T4565] tun0: group set to 0 [ 124.665442][ T4578] Т: renamed from pim6reg1 [ 124.929373][ T4617] device syzkaller0 entered promiscuous mode [ 126.200905][ T4685] FAULT_INJECTION: forcing a failure. [ 126.200905][ T4685] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 126.225704][ T4685] CPU: 1 PID: 4685 Comm: syz.2.1284 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 126.236890][ T4685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 126.246883][ T4685] Call Trace: [ 126.250027][ T4685] dump_stack_lvl+0x1e2/0x24b [ 126.254530][ T4685] ? bfq_pos_tree_add_move+0x43b/0x43b [ 126.259836][ T4685] ? 0xffffffffa002a000 [ 126.263820][ T4685] ? is_bpf_text_address+0x172/0x190 [ 126.268941][ T4685] dump_stack+0x15/0x17 [ 126.272935][ T4685] should_fail+0x3c6/0x510 [ 126.277187][ T4685] should_fail_usercopy+0x1a/0x20 [ 126.282134][ T4685] _copy_from_user+0x20/0xd0 [ 126.286562][ T4685] __se_sys_bpf+0x232/0x11cb0 [ 126.291319][ T4685] ? stack_trace_save+0x113/0x1c0 [ 126.296205][ T4685] ? terminate_walk+0x407/0x4f0 [ 126.300954][ T4685] ? stack_trace_snprint+0xf0/0xf0 [ 126.306006][ T4685] ? kmem_cache_free+0xa9/0x1e0 [ 126.310776][ T4685] ? kmem_cache_free+0xa9/0x1e0 [ 126.315455][ T4685] ? kasan_set_track+0x5d/0x70 [ 126.320057][ T4685] ? __x64_sys_bpf+0x90/0x90 [ 126.324486][ T4685] ? __kasan_slab_free+0x11/0x20 [ 126.329256][ T4685] ? slab_free_freelist_hook+0xc0/0x190 [ 126.334638][ T4685] ? kmem_cache_free+0xa9/0x1e0 [ 126.339326][ T4685] ? putname+0xe7/0x140 [ 126.343319][ T4685] ? do_sys_openat2+0x1fc/0x710 [ 126.348000][ T4685] ? __x64_sys_openat+0x243/0x290 [ 126.352861][ T4685] ? do_syscall_64+0x34/0x70 [ 126.357296][ T4685] ? _kstrtoull+0x3a0/0x4a0 [ 126.361713][ T4685] ? kstrtouint_from_user+0x20a/0x2a0 [ 126.366925][ T4685] ? kstrtol_from_user+0x310/0x310 [ 126.371897][ T4685] ? memset+0x35/0x40 [ 126.375689][ T4685] ? __fsnotify_parent+0x4b9/0x6c0 [ 126.380642][ T4685] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 126.387064][ T4685] ? proc_fail_nth_write+0x20b/0x290 [ 126.392183][ T4685] ? proc_fail_nth_read+0x210/0x210 [ 126.397216][ T4685] ? security_file_permission+0x86/0xb0 [ 126.402603][ T4685] ? rw_verify_area+0x1c3/0x360 [ 126.407283][ T4685] ? preempt_count_add+0x92/0x1a0 [ 126.412146][ T4685] ? vfs_write+0x852/0xe70 [ 126.416418][ T4685] ? kmem_cache_free+0xa9/0x1e0 [ 126.421081][ T4685] ? kernel_write+0x3d0/0x3d0 [ 126.425594][ T4685] ? __kasan_check_write+0x14/0x20 [ 126.430543][ T4685] ? mutex_lock+0xa5/0x110 [ 126.434787][ T4685] ? mutex_trylock+0xa0/0xa0 [ 126.439238][ T4685] ? __kasan_check_write+0x14/0x20 [ 126.444165][ T4685] ? fput_many+0x160/0x1b0 [ 126.448422][ T4685] ? debug_smp_processor_id+0x17/0x20 [ 126.453625][ T4685] __x64_sys_bpf+0x7b/0x90 [ 126.457875][ T4685] do_syscall_64+0x34/0x70 [ 126.462134][ T4685] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 126.467859][ T4685] RIP: 0033:0x7f76cfb65819 [ 126.472125][ T4685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.491554][ T4685] RSP: 002b:00007f76ce1de038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 126.499792][ T4685] RAX: ffffffffffffffda RBX: 00007f76cfd1cfa0 RCX: 00007f76cfb65819 [ 126.507604][ T4685] RDX: 0000000000000048 RSI: 00000000200009c0 RDI: 0000000000000000 [ 126.515414][ T4685] RBP: 00007f76ce1de090 R08: 0000000000000000 R09: 0000000000000000 [ 126.523222][ T4685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.531052][ T4685] R13: 0000000000000000 R14: 00007f76cfd1cfa0 R15: 00007ffe6afb4e78 [ 126.771900][ T4704] device pim6reg1 entered promiscuous mode [ 126.960870][ T4696] device pim6reg1 entered promiscuous mode [ 128.070881][ T4734] FAULT_INJECTION: forcing a failure. [ 128.070881][ T4734] name failslab, interval 1, probability 0, space 0, times 1 [ 128.207749][ T4734] CPU: 1 PID: 4734 Comm: syz.1.1298 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 128.218864][ T4734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 128.228855][ T4734] Call Trace: [ 128.232058][ T4734] dump_stack_lvl+0x1e2/0x24b [ 128.236930][ T4734] ? panic+0x812/0x812 [ 128.240910][ T4734] ? bfq_pos_tree_add_move+0x43b/0x43b [ 128.246202][ T4734] ? selinux_capable+0x2f1/0x430 [ 128.250978][ T4734] ? selinux_capset+0xf0/0xf0 [ 128.255492][ T4734] dump_stack+0x15/0x17 [ 128.259477][ T4734] should_fail+0x3c6/0x510 [ 128.263732][ T4734] ? bpf_map_area_alloc+0x4c/0xf0 [ 128.268589][ T4734] __should_failslab+0xa4/0xe0 [ 128.273188][ T4734] should_failslab+0x9/0x20 [ 128.277524][ T4734] __kmalloc+0x60/0x330 [ 128.281617][ T4734] bpf_map_area_alloc+0x4c/0xf0 [ 128.286303][ T4734] array_map_alloc+0x319/0x7c0 [ 128.290921][ T4734] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 128.296370][ T4734] ? selinux_bpf+0xcb/0x100 [ 128.300724][ T4734] ? array_map_alloc_check+0x27b/0x350 [ 128.306004][ T4734] __se_sys_bpf+0x620f/0x11cb0 [ 128.310607][ T4734] ? __send_signal+0x8b5/0xb90 [ 128.315206][ T4734] ? send_signal+0x4c1/0x5e0 [ 128.319627][ T4734] ? kmem_cache_free+0xa9/0x1e0 [ 128.324318][ T4734] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 128.329957][ T4734] ? __x64_sys_bpf+0x90/0x90 [ 128.334383][ T4734] ? _kstrtoull+0x3a0/0x4a0 [ 128.338722][ T4734] ? kstrtouint_from_user+0x20a/0x2a0 [ 128.343931][ T4734] ? kstrtol_from_user+0x310/0x310 [ 128.348905][ T4734] ? bpf_send_signal_common+0x2d8/0x420 [ 128.354265][ T4734] ? memset+0x35/0x40 [ 128.358081][ T4734] ? __fsnotify_parent+0x4b9/0x6c0 [ 128.363029][ T4734] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 128.369445][ T4734] ? proc_fail_nth_write+0x20b/0x290 [ 128.374568][ T4734] ? proc_fail_nth_read+0x210/0x210 [ 128.379603][ T4734] ? security_file_permission+0x86/0xb0 [ 128.384990][ T4734] ? rw_verify_area+0x1c3/0x360 [ 128.389680][ T4734] ? preempt_count_add+0x92/0x1a0 [ 128.394616][ T4734] ? vfs_write+0x852/0xe70 [ 128.398879][ T4734] ? kmem_cache_free+0x1c0/0x1e0 [ 128.403650][ T4734] ? kernel_write+0x3d0/0x3d0 [ 128.408159][ T4734] ? __kasan_check_write+0x14/0x20 [ 128.413112][ T4734] ? mutex_lock+0xa5/0x110 [ 128.417358][ T4734] ? mutex_trylock+0xa0/0xa0 [ 128.421787][ T4734] ? __kasan_check_write+0x14/0x20 [ 128.426734][ T4734] ? fput_many+0x160/0x1b0 [ 128.430989][ T4734] ? debug_smp_processor_id+0x17/0x20 [ 128.436193][ T4734] __x64_sys_bpf+0x7b/0x90 [ 128.440449][ T4734] do_syscall_64+0x34/0x70 [ 128.444702][ T4734] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 128.450425][ T4734] RIP: 0033:0x7f8228e33819 [ 128.454680][ T4734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.474116][ T4734] RSP: 002b:00007f82274ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 128.482375][ T4734] RAX: ffffffffffffffda RBX: 00007f8228feafa0 RCX: 00007f8228e33819 [ 128.490192][ T4734] RDX: 0000000000000048 RSI: 00000000200009c0 RDI: 0000000000000000 [ 128.497982][ T4734] RBP: 00007f82274ac090 R08: 0000000000000000 R09: 0000000000000000 [ 128.505792][ T4734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.513611][ T4734] R13: 0000000000000000 R14: 00007f8228feafa0 R15: 00007ffd88041dd8 [ 128.981377][ T4751] syz.3.1302[4751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.029423][ T4751] device veth1_macvtap left promiscuous mode [ 129.493063][ T4751] device macsec0 left promiscuous mode [ 129.943601][ T24] audit: type=1400 audit(1732128294.450:170): avc: denied { create } for pid=4792 comm="syz.0.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 130.651380][ T4824] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.661659][ T4824] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.744955][ T4832] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.751862][ T4832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.758960][ T4832] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.765859][ T4832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.790569][ T4832] device bridge0 entered promiscuous mode [ 131.338227][ T4859] device syzkaller0 entered promiscuous mode [ 133.260721][ T4934] device pim6reg1 entered promiscuous mode [ 133.492623][ T4963] syz.1.1357[4963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.492681][ T4963] syz.1.1357[4963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.673340][ T4961] device veth0_vlan left promiscuous mode [ 134.150819][ T4961] device veth0_vlan entered promiscuous mode [ 134.212150][ T4974] device sit0 left promiscuous mode [ 134.235450][ T4977] device sit0 entered promiscuous mode [ 134.830344][ T5004] syz.1.1365[5004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.830403][ T5004] syz.1.1365[5004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.132363][ T24] audit: type=1400 audit(1732128299.590:171): avc: denied { create } for pid=5011 comm="syz.1.1367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 135.896698][ T5031] device veth0_vlan left promiscuous mode [ 135.969277][ T5031] device veth0_vlan entered promiscuous mode [ 136.740980][ T5054] device pim6reg1 entered promiscuous mode [ 137.445444][ T5098] device sit0 left promiscuous mode [ 137.843897][ T5116] syz.1.1396[5116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.843985][ T5116] syz.1.1396[5116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.925585][ T5178] syz.0.1414[5178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.941979][ T5178] syz.0.1414[5178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.954185][ T5178] syz.0.1414[5178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.966264][ T5178] syz.0.1414[5178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.992369][ T5180] syz.3.1415[5180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.003717][ T5180] syz.3.1415[5180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.588568][ T5199] device sit0 entered promiscuous mode [ 140.226316][ T5223] bpf_get_probe_write_proto: 2 callbacks suppressed [ 140.226327][ T5223] syz.3.1430[5223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.254679][ T5223] syz.3.1430[5223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.278924][ T5228] device pim6reg1 entered promiscuous mode [ 140.893874][ T5247] device syzkaller0 entered promiscuous mode [ 141.602031][ T5294] device lo entered promiscuous mode [ 141.815053][ T5335] syz.3.1462[5335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.815115][ T5335] syz.3.1462[5335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.923880][ T5342] Т: renamed from pim6reg1 [ 142.483989][ T5372] device pim6reg1 entered promiscuous mode [ 142.589430][ T5372] device syzkaller0 entered promiscuous mode [ 143.121793][ T5400] device syzkaller0 entered promiscuous mode [ 143.244939][ T5407] device pim6reg1 entered promiscuous mode [ 143.267089][ T5408] tap0: tun_chr_ioctl cmd 1074025677 [ 143.277441][ T5408] tap0: linktype set to 780 [ 143.503622][ T5416] device syzkaller0 entered promiscuous mode [ 143.883903][ T5441] device macsec0 entered promiscuous mode [ 144.093790][ T5441] device veth1_macvtap entered promiscuous mode [ 144.175922][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 144.210618][ T5442] device veth1_macvtap left promiscuous mode [ 144.495682][ T5463] device veth0_vlan left promiscuous mode [ 144.511838][ T5463] device veth0_vlan entered promiscuous mode [ 144.561342][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.575473][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.582974][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 146.993705][ T5520] syz.1.1515[5520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.993789][ T5520] syz.1.1515[5520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.040678][ T5596] Т: renamed from pim6reg1 [ 149.577311][ T5631] syz.1.1549[5631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.577370][ T5631] syz.1.1549[5631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.630855][ T5631] syz.1.1549[5631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.668374][ T5631] syz.1.1549[5631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.197538][ T5693] device syzkaller0 entered promiscuous mode [ 151.462340][ T5720] syz.0.1577[5720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.462395][ T5720] syz.0.1577[5720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.547500][ T5730] syz.0.1577[5730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.558920][ T5730] syz.0.1577[5730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.570520][ T5720] device pim6reg1 entered promiscuous mode [ 151.994522][ T5751] device pim6reg1 entered promiscuous mode [ 152.304937][ T5766] device sit0 left promiscuous mode [ 152.429424][ T5769] device pim6reg1 entered promiscuous mode [ 153.241286][ T5804] device syzkaller0 entered promiscuous mode [ 153.308589][ T5807] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 153.360057][ T5812] syz.4.1602[5812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.360116][ T5812] syz.4.1602[5812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.408790][ T5810] device veth0_vlan left promiscuous mode [ 153.439951][ T5810] device veth0_vlan entered promiscuous mode [ 153.527560][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 153.536443][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 153.544185][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.422407][ T5852] device veth1_macvtap left promiscuous mode [ 154.450275][ T5852] device macsec0 left promiscuous mode [ 154.683122][ T5872] syz.3.1620[5872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.683180][ T5872] syz.3.1620[5872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.754647][ T5874] syz.3.1620[5874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.769513][ T5858] device veth1_macvtap entered promiscuous mode [ 154.787513][ T5874] syz.3.1620[5874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.788168][ T5858] device macsec0 entered promiscuous mode [ 154.994683][ T5885] device wg2 left promiscuous mode [ 156.782619][ T5885] device wg2 entered promiscuous mode [ 170.678798][ T5924] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.685910][ T5924] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.693188][ T5924] device bridge_slave_0 entered promiscuous mode [ 170.712046][ T5922] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.718895][ T5922] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.726609][ T5922] device bridge_slave_0 entered promiscuous mode [ 170.736101][ T5924] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.743842][ T5924] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.751355][ T5924] device bridge_slave_1 entered promiscuous mode [ 170.764194][ T5921] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.771505][ T5921] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.778766][ T5921] device bridge_slave_0 entered promiscuous mode [ 170.785647][ T5922] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.793150][ T5922] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.800868][ T5922] device bridge_slave_1 entered promiscuous mode [ 170.807337][ T5923] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.815805][ T5923] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.823298][ T5923] device bridge_slave_0 entered promiscuous mode [ 170.834906][ T5921] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.842566][ T5921] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.849809][ T5921] device bridge_slave_1 entered promiscuous mode [ 170.863414][ T5920] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.870721][ T5920] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.877989][ T5920] device bridge_slave_0 entered promiscuous mode [ 170.884984][ T5923] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.892471][ T5923] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.899749][ T5923] device bridge_slave_1 entered promiscuous mode [ 170.917752][ T5920] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.925335][ T5920] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.932909][ T5920] device bridge_slave_1 entered promiscuous mode [ 171.096909][ T5924] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.103776][ T5924] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.110900][ T5924] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.117644][ T5924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.152325][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.159407][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.317850][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.325446][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.340743][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.349046][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.357300][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.364160][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.411232][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.419420][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.427720][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.434578][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.441912][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.449145][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.457858][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.466188][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.474196][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.481041][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.488301][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.495895][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.503163][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.511279][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.519166][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.526023][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.533456][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.541822][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.549717][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.556484][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.563732][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.571579][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.579260][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.586559][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.593859][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.602018][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.609985][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.616897][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.624320][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.632613][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.640625][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.647444][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.654709][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.662478][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.669878][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.677996][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.685890][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.710901][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.719061][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.727491][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.734342][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.742900][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.750269][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.757769][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.765910][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.774064][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.780912][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.788153][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.796309][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.804298][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.811142][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.818311][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.826322][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.834125][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.843394][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.871508][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.880584][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.888876][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.897337][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.905720][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.913796][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.924351][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.932257][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.943285][ T5921] device veth0_vlan entered promiscuous mode [ 171.965546][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.973699][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.982189][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.990451][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.997684][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.011842][ T5923] device veth0_vlan entered promiscuous mode [ 172.019340][ T5924] device veth0_vlan entered promiscuous mode [ 172.027249][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.035365][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.042732][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.050225][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 172.057918][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.066294][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.073904][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.106567][ T5920] device veth0_vlan entered promiscuous mode [ 172.116667][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.125417][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.134550][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 172.145388][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.153461][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.161006][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.171202][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 172.179627][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 172.189171][ T5923] device veth1_macvtap entered promiscuous mode [ 172.212831][ T5924] device veth1_macvtap entered promiscuous mode [ 172.221584][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 172.229382][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.237404][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.244789][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.253306][ T5922] device veth0_vlan entered promiscuous mode [ 172.260959][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.268936][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.285581][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.294491][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.303138][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.311602][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.333382][ T5920] device veth1_macvtap entered promiscuous mode [ 172.341805][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.349896][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.358587][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.367102][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.375659][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.383833][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.392760][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.405406][ T5922] device veth1_macvtap entered promiscuous mode [ 172.413105][ T5921] device veth1_macvtap entered promiscuous mode [ 172.421985][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.429628][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.438519][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.446679][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.476984][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.489360][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.498409][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.507260][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.548826][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.570478][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.578828][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.587520][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.596003][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.604766][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.672635][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.711398][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 173.308721][ T5951] device syzkaller0 entered promiscuous mode [ 173.315697][ T5975] syz.7.1635[5975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.315759][ T5975] syz.7.1635[5975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.370022][ T5976] syz.7.1635[5976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.381607][ T5976] syz.7.1635[5976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.436648][ T7] device bridge_slave_1 left promiscuous mode [ 173.455137][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.480500][ T7] device bridge_slave_0 left promiscuous mode [ 173.490248][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.498861][ T7] device bridge_slave_1 left promiscuous mode [ 173.510070][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.530716][ T7] device bridge_slave_0 left promiscuous mode [ 173.536722][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.560383][ T7] device bridge_slave_1 left promiscuous mode [ 173.566360][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.573747][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.590593][ T7] device veth0_vlan left promiscuous mode [ 173.596750][ T7] device veth1_macvtap left promiscuous mode [ 174.176111][ T5988] device veth0_to_team entered promiscuous mode [ 174.633926][ T6002] device veth0_to_bond entered promiscuous mode [ 175.144262][ T6016] syz.5.1648[6016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.144321][ T6016] syz.5.1648[6016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.226936][ T6016] device pim6reg1 entered promiscuous mode [ 176.052686][ T7] GPL: port 1(erspan0) entered disabled state [ 176.084302][ T7] device erspan0 left promiscuous mode [ 176.131497][ T7] GPL: port 1(erspan0) entered disabled state [ 176.187453][ T6041] device sit0 entered promiscuous mode [ 176.862824][ T7] device bridge_slave_1 left promiscuous mode [ 176.873252][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.889428][ T7] device bridge_slave_0 left promiscuous mode [ 176.896202][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.905020][ T7] device veth1_macvtap left promiscuous mode [ 176.941142][ T6056] syz.9.1659[6056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.941185][ T6056] syz.9.1659[6056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.005402][ T6057] syz.9.1659[6057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.016871][ T6057] syz.9.1659[6057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.082815][ T6056] device pim6reg1 entered promiscuous mode [ 177.625300][ T6062] device syzkaller0 entered promiscuous mode [ 178.938793][ T6102] 8ћХ: renamed from syzkaller0 [ 179.271065][ T6111] device pim6reg1 entered promiscuous mode [ 180.759079][ T6155] device pim6reg1 entered promiscuous mode [ 180.860054][ T6159] device pim6reg1 entered promiscuous mode [ 181.536080][ T6185] device syzkaller0 entered promiscuous mode [ 182.350505][ T6212] device pim6reg1 entered promiscuous mode [ 182.695532][ T6225] device veth0_vlan left promiscuous mode [ 182.739174][ T6225] device veth0_vlan entered promiscuous mode [ 183.451958][ T6262] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.460576][ T6262] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.006499][ T6310] device syzkaller0 entered promiscuous mode [ 185.189904][ T6320] device veth1_macvtap left promiscuous mode [ 185.347891][ T6324] device veth1_macvtap entered promiscuous mode [ 185.361379][ T6324] device macsec0 entered promiscuous mode [ 186.370153][ T6352] device sit0 left promiscuous mode [ 190.765132][ T6458] syz.6.1773[6458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.765210][ T6458] syz.6.1773[6458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.014761][ T6460] device pim6reg1 entered promiscuous mode [ 191.311902][ T6458] syz.6.1773[6458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.311981][ T6458] syz.6.1773[6458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.563308][ T6471] syz.6.1776[6471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.604900][ T6471] syz.6.1776[6471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.720788][ T6477] device pim6reg1 entered promiscuous mode [ 191.849989][ T6471] syz.6.1776[6471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.850051][ T6471] syz.6.1776[6471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.479825][ T6486] device syzkaller0 entered promiscuous mode [ 193.673153][ T6535] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 193.785256][ T6542] syz.9.1801[6542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.785313][ T6542] syz.9.1801[6542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.860499][ T24] audit: type=1400 audit(1732128358.360:172): avc: denied { write } for pid=6548 comm="syz.8.1804" name="net" dev="proc" ino=37074 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 193.893159][ T24] audit: type=1400 audit(1732128358.360:173): avc: denied { add_name } for pid=6548 comm="syz.8.1804" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 193.913928][ T6552] device pim6reg1 entered promiscuous mode [ 193.920321][ T24] audit: type=1400 audit(1732128358.370:174): avc: denied { create } for pid=6548 comm="syz.8.1804" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 193.921212][ T6549] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.948158][ T24] audit: type=1400 audit(1732128358.370:175): avc: denied { associate } for pid=6548 comm="syz.8.1804" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 194.288677][ T6561] device syzkaller0 entered promiscuous mode [ 195.053002][ T6584] device syzkaller0 entered promiscuous mode [ 195.178414][ T6586] device syzkaller0 entered promiscuous mode [ 195.379451][ T6605] device pim6reg1 entered promiscuous mode [ 195.770176][ T6617] device veth0_vlan left promiscuous mode [ 195.900235][ T6617] device veth0_vlan entered promiscuous mode [ 197.033129][ T6655] bpf_get_probe_write_proto: 6 callbacks suppressed [ 197.033140][ T6655] syz.5.1833[6655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.090220][ T6655] syz.5.1833[6655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.117868][ T6656] device pim6reg1 entered promiscuous mode [ 197.161471][ T6657] syz.5.1833[6657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.161534][ T6657] syz.5.1833[6657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.487152][ T6665] device veth0_vlan left promiscuous mode [ 197.555172][ T6665] device veth0_vlan entered promiscuous mode [ 197.598753][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.621212][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.670342][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.959720][ T6674] device sit0 entered promiscuous mode [ 199.000364][ T6693] device syzkaller0 entered promiscuous mode [ 200.577831][ T6740] syz.7.1853[6740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.577899][ T6740] syz.7.1853[6740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.700167][ T6742] device pim6reg1 entered promiscuous mode [ 200.718118][ T6740] syz.7.1853[6740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.718176][ T6740] syz.7.1853[6740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.843642][ T6756] device pim6reg1 entered promiscuous mode [ 201.756474][ T6796] syz.5.1870[6796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.756532][ T6796] syz.5.1870[6796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.853602][ T6799] device pim6reg1 entered promiscuous mode [ 203.434751][ T6839] bpf_get_probe_write_proto: 2 callbacks suppressed [ 203.434762][ T6839] syz.6.1882[6839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.510529][ T6839] syz.6.1882[6839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.531442][ T6842] device pim6reg1 entered promiscuous mode [ 203.567962][ T6839] syz.6.1882[6839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.568021][ T6839] syz.6.1882[6839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.691071][ T6899] syz.9.1900[6899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.702547][ T6899] syz.9.1900[6899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.751590][ T6906] device pim6reg1 entered promiscuous mode [ 204.792108][ T6899] syz.9.1900[6899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.792170][ T6899] syz.9.1900[6899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.068167][ T24] audit: type=1400 audit(1732128369.570:176): avc: denied { create } for pid=6923 comm="syz.9.1909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 205.118883][ T6924] device sit0 entered promiscuous mode [ 206.784985][ T6967] syz.8.1919[6967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.785047][ T6967] syz.8.1919[6967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.923577][ T6968] device pim6reg1 entered promiscuous mode [ 207.534078][ T6977] device pim6reg1 entered promiscuous mode [ 208.201934][ T7004] device syzkaller0 entered promiscuous mode [ 210.231590][ T7057] device pim6reg1 entered promiscuous mode [ 210.495605][ T7070] device syzkaller0 entered promiscuous mode [ 210.575946][ T7075] bpf_get_probe_write_proto: 4 callbacks suppressed [ 210.575957][ T7075] syz.8.1947[7075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.620468][ T7075] syz.8.1947[7075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.662003][ T7077] device pim6reg1 entered promiscuous mode [ 210.731585][ T7075] syz.8.1947[7075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.731646][ T7075] syz.8.1947[7075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.950685][ T7084] device veth0_vlan left promiscuous mode [ 211.036959][ T7084] device veth0_vlan entered promiscuous mode [ 211.151410][ T7090] device veth1_macvtap left promiscuous mode [ 211.157272][ T7090] device macsec0 entered promiscuous mode [ 211.313111][ T7090] device veth1_macvtap entered promiscuous mode [ 211.431473][ T7107] device syzkaller0 entered promiscuous mode [ 211.924019][ T7133] syz.8.1961[7133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.924081][ T7133] syz.8.1961[7133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.092350][ T7133] syz.8.1961[7133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.150148][ T7133] syz.8.1961[7133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.184882][ T7126] device pim6reg1 entered promiscuous mode [ 212.825023][ T7163] device pim6reg1 entered promiscuous mode [ 213.069453][ T7173] syz.5.1976[7173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.069515][ T7173] syz.5.1976[7173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.090512][ T7173] device pim6reg1 entered promiscuous mode [ 213.374389][ T7185] device syzkaller0 entered promiscuous mode [ 213.677452][ T7196] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.685541][ T7196] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.882639][ T7200] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.889549][ T7200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.896660][ T7200] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.903540][ T7200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.128073][ T7200] device bridge0 entered promiscuous mode [ 214.871074][ T7229] device syzkaller0 entered promiscuous mode [ 215.254033][ T7242] device syzkaller0 entered promiscuous mode [ 215.577472][ T7286] device veth1_macvtap left promiscuous mode [ 215.606319][ T7300] device syzkaller0 entered promiscuous mode [ 215.621414][ T7286] device veth1_macvtap entered promiscuous mode [ 215.739753][ T7319] Т: renamed from pim6reg1 [ 215.833140][ T7277] cgroup: fork rejected by pids controller in /syz9 [ 215.995298][ T7319] device syzkaller0 entered promiscuous mode [ 216.232071][ T7384] device pim6reg1 entered promiscuous mode [ 216.241000][ T7382] device pim6reg1 entered promiscuous mode [ 216.312342][ T7386] device veth1_macvtap left promiscuous mode [ 216.318282][ T7386] device macsec0 left promiscuous mode [ 216.662519][ T7405] device pim6reg1 entered promiscuous mode [ 217.681179][ T7461] device pim6reg1 entered promiscuous mode [ 217.741909][ T7467] device pim6reg1 entered promiscuous mode [ 218.734023][ T7525] device pim6reg1 entered promiscuous mode [ 220.143901][ T7585] bpf_get_probe_write_proto: 2 callbacks suppressed [ 220.143912][ T7585] syz.5.2078[7585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.194507][ T7583] device pim6reg1 entered promiscuous mode [ 220.216905][ T7585] syz.5.2078[7585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.217223][ T7593] device veth0_to_team entered promiscuous mode [ 220.217297][ T7583] syz.5.2078[7583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.235614][ T7583] syz.5.2078[7583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.803339][ T7618] device pim6reg1 entered promiscuous mode [ 220.943581][ T7627] syz.5.2092[7627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.943640][ T7627] syz.5.2092[7627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.982851][ T7627] device pim6reg1 entered promiscuous mode [ 221.012541][ T7627] syz.5.2092[7627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.012599][ T7627] syz.5.2092[7627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.435341][ T7644] device syzkaller0 entered promiscuous mode [ 221.527966][ T7648] device syzkaller0 entered promiscuous mode [ 221.861503][ T7670] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.891498][ T7675] syz.7.2106[7675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.891561][ T7675] syz.7.2106[7675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.949153][ T7677] device syzkaller0 entered promiscuous mode [ 222.123458][ T24] audit: type=1400 audit(1732128386.620:177): avc: denied { create } for pid=7676 comm="syz.9.2107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 223.817436][ T7732] device pim6reg1 entered promiscuous mode [ 225.218185][ T7770] device pim6reg1 entered promiscuous mode [ 225.324657][ T7777] device syzkaller0 entered promiscuous mode [ 225.990345][ T7800] device pim6reg1 entered promiscuous mode [ 227.714268][ T7849] device sit0 entered promiscuous mode [ 227.851593][ T7854] syz.9.2157[7854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.233088][ T7885] tap0: tun_chr_ioctl cmd 1074025673 [ 229.824879][ T7925] device syzkaller0 entered promiscuous mode [ 231.016414][ T7943] device sit0 left promiscuous mode [ 231.649773][ T7976] device pim6reg1 entered promiscuous mode [ 232.223265][ T7990] device pim6reg1 entered promiscuous mode [ 232.484780][ T8002] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.494068][ T8002] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.855421][ T8015] device veth0_vlan left promiscuous mode [ 232.930100][ T8015] device veth0_vlan entered promiscuous mode [ 233.763052][ T8042] device pim6reg1 entered promiscuous mode [ 235.285673][ T8089] device pim6reg1 entered promiscuous mode [ 236.624011][ T8137] device pim6reg1 entered promiscuous mode [ 236.686989][ T8146] device dummy0 entered promiscuous mode [ 237.299625][ T8181] device veth0_vlan left promiscuous mode [ 237.344006][ T8181] device veth0_vlan entered promiscuous mode [ 237.490898][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.504251][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.553455][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.686275][ T8212] device pim6reg1 entered promiscuous mode [ 238.034912][ T8228] syz.9.2261[8228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.040134][ T8228] syz.9.2261[8228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.843511][ T8239] device syzkaller0 entered promiscuous mode [ 238.974282][ T8244] device sit0 left promiscuous mode [ 239.149731][ T8252] syz.6.2269[8252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.149795][ T8252] syz.6.2269[8252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.299333][ T8264] tun0: tun_chr_ioctl cmd 1074025675 [ 239.316595][ T8264] tun0: persist enabled [ 239.327329][ T8264] tun0: tun_chr_ioctl cmd 1074025675 [ 239.332953][ T8264] tun0: persist disabled [ 239.606739][ T8285] device macsec0 entered promiscuous mode [ 239.942221][ T8294] device veth1_macvtap entered promiscuous mode [ 239.948869][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.051768][ T8294] device veth1_macvtap left promiscuous mode [ 240.978451][ T8326] device macsec0 left promiscuous mode [ 241.976415][ T8387] device syzkaller0 entered promiscuous mode [ 244.403790][ T8471] device syzkaller0 entered promiscuous mode [ 245.715932][ T8510] device pim6reg1 entered promiscuous mode [ 245.973134][ T8524] syz.9.2347[8524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.973193][ T8524] syz.9.2347[8524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.379409][ T8527] device syzkaller0 entered promiscuous mode [ 246.780020][ T8542] device pim6reg1 entered promiscuous mode [ 247.304920][ T8564] device sit0 left promiscuous mode [ 247.486247][ T8568] device sit0 entered promiscuous mode [ 247.572654][ T8574] device sit0 entered promiscuous mode [ 247.905871][ T8589] Т: renamed from pim6reg1 [ 248.309127][ T8612] syz.9.2370[8612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.309220][ T8612] syz.9.2370[8612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.321965][ T8612] device pim6reg1 entered promiscuous mode [ 248.350025][ T8612] syz.9.2370[8612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.350088][ T8612] syz.9.2370[8612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.750109][ T8625] device pim6reg1 entered promiscuous mode [ 249.780632][ T8652] syz.9.2383[8652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.780692][ T8652] syz.9.2383[8652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.834916][ T8652] device pim6reg1 entered promiscuous mode [ 249.858565][ T8657] syz.9.2383[8657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.858624][ T8657] syz.9.2383[8657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.025368][ T8728] device sit0 entered promiscuous mode [ 253.182007][ T8819] device wg2 entered promiscuous mode [ 253.373064][ T8826] device pim6reg1 entered promiscuous mode [ 254.448417][ T8881] tap0: tun_chr_ioctl cmd 1074025675 [ 254.514419][ T8881] tap0: persist disabled [ 255.064521][ T8905] device sit0 entered promiscuous mode [ 256.220113][ T8930] device sit0 left promiscuous mode [ 256.930255][ T8959] device pim6reg1 entered promiscuous mode [ 257.003276][ T8963] device veth0_vlan left promiscuous mode [ 257.009143][ T8963] device veth0_vlan entered promiscuous mode [ 257.120334][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.131485][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.138913][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.486801][ T8998] device syzkaller0 entered promiscuous mode [ 257.696190][ T9000] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.703185][ T9000] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.720724][ T9000] device bridge0 left promiscuous mode [ 258.277411][ T9030] device bridge_slave_1 left promiscuous mode [ 258.322181][ T9030] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.380127][ T9030] device bridge_slave_0 left promiscuous mode [ 258.403200][ T9030] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.629007][ T9072] device veth1_macvtap entered promiscuous mode [ 258.646115][ T9072] device macsec0 entered promiscuous mode [ 258.665250][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 258.905171][ T9095] device veth0_vlan left promiscuous mode [ 258.970760][ T24] audit: type=1400 audit(1732128423.480:178): avc: denied { create } for pid=9110 comm="syz.7.2514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 258.976755][ T9095] device veth0_vlan entered promiscuous mode [ 259.304632][ T9121] device veth1_macvtap left promiscuous mode [ 259.477682][ T9121] device veth1_macvtap entered promiscuous mode [ 259.517002][ T9121] device macsec0 entered promiscuous mode [ 259.778403][ T9135] device veth0_vlan left promiscuous mode [ 259.813281][ T9135] device veth0_vlan entered promiscuous mode [ 260.802158][ T9189] device sit0 left promiscuous mode [ 261.194981][ T9206] syz.8.2541[9206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.195040][ T9206] syz.8.2541[9206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.398320][ T9210] device pim6reg1 entered promiscuous mode [ 261.420565][ T9206] syz.8.2541[9206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.420622][ T9206] syz.8.2541[9206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.487553][ T9216] device pim6reg1 entered promiscuous mode [ 262.709875][ T9262] device pim6reg1 entered promiscuous mode [ 262.769468][ T9265] device syzkaller0 entered promiscuous mode [ 263.735369][ T9298] device pim6reg1 entered promiscuous mode [ 263.820246][ T9311] device pim6reg1 entered promiscuous mode [ 264.152146][ T9316] device pim6reg1 entered promiscuous mode [ 265.675695][ T9344] device pim6reg1 entered promiscuous mode [ 266.441092][ T9386] device pim6reg1 entered promiscuous mode [ 266.862407][ T9403] device syzkaller0 entered promiscuous mode [ 268.407601][ T9500] device pim6reg1 entered promiscuous mode [ 268.583938][ T9515] : renamed from ipvlan1 [ 268.872767][ T9519] device vxcan1 entered promiscuous mode [ 270.304201][ T9559] device pim6reg1 entered promiscuous mode [ 270.585772][ T9571] device veth0_vlan left promiscuous mode [ 270.603890][ T9571] device veth0_vlan entered promiscuous mode [ 270.843706][ T9579] device syzkaller0 entered promiscuous mode [ 272.480495][ T9652] syz.7.2673[9652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.480557][ T9652] syz.7.2673[9652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.518134][ T9652] device pim6reg1 entered promiscuous mode [ 272.624446][ T9652] syz.7.2673[9652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.624505][ T9652] syz.7.2673[9652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.642213][ T9660] device veth0_vlan left promiscuous mode [ 272.709105][ T9660] device veth0_vlan entered promiscuous mode [ 272.765049][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.777667][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.796933][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.301640][ T9695] syz.5.2686[9695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.301701][ T9695] syz.5.2686[9695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.376232][ T9694] device syzkaller0 entered promiscuous mode [ 273.733814][ T9729] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.740808][ T9729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.747903][ T9729] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.754814][ T9729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.791239][ T9729] device bridge0 entered promiscuous mode [ 274.423052][ T9779] device pim6reg1 entered promiscuous mode [ 274.650344][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.814130][ T9799] device macsec0 entered promiscuous mode [ 275.254062][ T9836] device pim6reg1 entered promiscuous mode [ 276.529659][ T9882] device pim6reg1 entered promiscuous mode [ 276.911140][ T9892] device veth0_vlan left promiscuous mode [ 276.932927][ T9892] device veth0_vlan entered promiscuous mode [ 277.013826][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.037375][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.090795][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 278.918841][ T9958] syz.5.2762[9958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.918903][ T9958] syz.5.2762[9958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.071353][ T9968] device pim6reg1 entered promiscuous mode [ 279.187011][ T9958] syz.5.2762[9958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.187069][ T9958] syz.5.2762[9958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.187379][ T9966] syz.7.2764[9966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.243323][ T9966] syz.7.2764[9966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.035371][T10011] syz.5.2777[10011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.150609][T10013] device pim6reg1 entered promiscuous mode [ 280.174565][T10011] syz.5.2777[10011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.202374][T10011] syz.5.2777[10011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.214619][T10011] syz.5.2777[10011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.244062][T10017] device sit0 left promiscuous mode [ 280.302044][T10018] device sit0 entered promiscuous mode [ 280.633391][T10028] device pim6reg1 entered promiscuous mode [ 280.875452][T10041] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.884170][T10041] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.961364][T10041] device bridge0 left promiscuous mode [ 281.949066][T10065] device syzkaller0 entered promiscuous mode [ 283.636258][T10134] device pim6reg1 entered promiscuous mode [ 283.835833][T10141] device pim6reg1 entered promiscuous mode [ 284.198543][T10148] device syzkaller0 entered promiscuous mode [ 284.500516][T10174] QБ6уз\b‹ЁY­4: renamed from lo [ 284.872904][T10202] bpf_get_probe_write_proto: 2 callbacks suppressed [ 284.872916][T10202] syz.7.2831[10202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.948942][T10202] syz.7.2831[10202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.961161][T10205] device pim6reg1 entered promiscuous mode [ 285.049555][T10212] syz.7.2831[10212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.049699][T10212] syz.7.2831[10212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.636270][T10246] device pim6reg1 entered promiscuous mode [ 286.568529][T10266] device syzkaller0 entered promiscuous mode [ 286.944036][T10280] syz.5.2854[10280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.944097][T10280] syz.5.2854[10280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.091424][T10282] device pim6reg1 entered promiscuous mode [ 287.115187][T10282] syz.5.2854[10282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.115257][T10282] syz.5.2854[10282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.775215][T10297] device syzkaller0 entered promiscuous mode [ 288.277353][T10314] device sit0 left promiscuous mode [ 288.323732][T10315] device sit0 entered promiscuous mode [ 289.191835][T10335] device veth1_macvtap left promiscuous mode [ 289.254069][T10335] device macsec0 left promiscuous mode [ 289.742155][T10350] device syzkaller0 entered promiscuous mode [ 290.960836][T10373] device wg2 entered promiscuous mode [ 291.298198][T10400] device syzkaller0 entered promiscuous mode [ 292.739376][T10451] device syzkaller0 entered promiscuous mode [ 292.926709][T10480] device pim6reg1 entered promiscuous mode [ 293.021076][T10486] device wg2 left promiscuous mode [ 293.112397][T10486] device wg2 entered promiscuous mode [ 295.006003][T10541] device sit0 entered promiscuous mode [ 296.107569][T10638] device pim6reg1 entered promiscuous mode [ 296.123283][T10614] tap0: tun_chr_ioctl cmd 1074812117 [ 296.766105][T10688] device sit0 left promiscuous mode [ 297.296371][T10732] device syzkaller0 entered promiscuous mode [ 297.354609][T10734] device syzkaller0 entered promiscuous mode [ 297.682004][T10761] syz.5.2996[10761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.682058][T10761] syz.5.2996[10761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.883768][T10769] syz.8.2993[10769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.725207][T10794] device syzkaller0 entered promiscuous mode [ 300.031787][T10861] syz.7.3024[10861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.031845][T10861] syz.7.3024[10861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.084175][T10861] syz.7.3024[10861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.134160][T10861] syz.7.3024[10861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.461983][ T24] audit: type=1400 audit(1732128464.950:179): avc: denied { create } for pid=10895 comm="syz.6.3031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 301.036661][T10909] syz.9.3038[10909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.036721][T10909] syz.9.3038[10909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.192157][T10909] syz.9.3038[10909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.281851][T10916] device veth0_vlan left promiscuous mode [ 301.299626][T10916] device veth0_vlan entered promiscuous mode [ 301.365540][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.379853][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 301.388844][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 301.783393][T10953] device pim6reg1 entered promiscuous mode [ 301.991128][T10962] device pim6reg1 entered promiscuous mode [ 303.148303][T11004] device pim6reg1 entered promiscuous mode [ 303.578576][T11024] device pim6reg1 entered promiscuous mode [ 303.861703][T11040] device syzkaller0 entered promiscuous mode [ 303.924794][T11040] device veth0_vlan left promiscuous mode [ 303.974272][T11040] device veth0_vlan entered promiscuous mode [ 304.050025][T11053] device pim6reg1 entered promiscuous mode [ 304.940153][T11101] device pim6reg1 entered promiscuous mode [ 305.600450][T11122] bpf_get_probe_write_proto: 1 callbacks suppressed [ 305.600461][T11122] syz.7.3103[11122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.697949][T11122] syz.7.3103[11122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.152349][T11139] device pim6reg1 entered promiscuous mode [ 306.879759][T11166] syz.8.3117[11166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.879819][T11166] syz.8.3117[11166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.972716][T11167] syz.8.3117[11167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.085725][T11167] syz.8.3117[11167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.668553][T11202] rose0: tun_chr_ioctl cmd 1074025677 [ 307.722858][T11202] rose0: linktype set to 805 [ 307.743193][T11206] syz.9.3129[11206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.743246][T11206] syz.9.3129[11206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.778653][T11206] syz.9.3129[11206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.804177][T11206] syz.9.3129[11206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.834020][T11213] device pim6reg1 entered promiscuous mode [ 309.701922][T11348] device pim6reg1 entered promiscuous mode [ 309.832372][T11351] device veth1_macvtap left promiscuous mode [ 309.871324][T11354] device veth1_macvtap entered promiscuous mode [ 309.882377][T11354] device macsec0 entered promiscuous mode [ 310.481770][T11414] device pim6reg1 entered promiscuous mode [ 311.152485][T11449] device pim6reg1 entered promiscuous mode [ 312.480176][T11504] device pim6reg1 entered promiscuous mode [ 312.899644][T11528] device pim6reg1 entered promiscuous mode [ 313.176234][T11535] device sit0 entered promiscuous mode [ 313.536307][T11558] tap0: tun_chr_ioctl cmd 1074025673 [ 313.570187][T11560] device pim6reg1 entered promiscuous mode [ 313.881292][T11570] device sit0 left promiscuous mode [ 313.958020][T11571] device sit0 entered promiscuous mode [ 314.396807][T11584] device wg2 left promiscuous mode [ 314.477900][T11585] device wg2 entered promiscuous mode [ 316.793860][T11651] device pim6reg1 entered promiscuous mode [ 317.068095][T11676] device pim6reg1 entered promiscuous mode [ 317.814442][T11713] device pim6reg1 entered promiscuous mode [ 318.036145][T11718] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.043905][T11718] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.255775][T11726] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 318.288136][T11726] device syzkaller0 entered promiscuous mode [ 318.703962][T11739] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 318.863148][T11739] device syzkaller0 entered promiscuous mode [ 320.416809][T11814] bpf_get_probe_write_proto: 10 callbacks suppressed [ 320.416821][T11814] syz.8.3314[11814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.470191][T11814] syz.8.3314[11814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.396186][T11872] device pim6reg1 entered promiscuous mode [ 322.740948][T11894] device bridge_slave_1 left promiscuous mode [ 322.769029][T11894] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.801165][T11894] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.025290][T11905] device sit0 entered promiscuous mode [ 323.436183][T11919] device pim6reg1 entered promiscuous mode [ 323.533723][T11927] device syzkaller0 entered promiscuous mode [ 323.900210][T11945] device pim6reg1 entered promiscuous mode [ 324.007511][T11948] device syzkaller0 entered promiscuous mode [ 324.468693][T11965] device syzkaller0 entered promiscuous mode [ 324.949389][T11988] device syzkaller0 entered promiscuous mode [ 325.215082][T12008] device pim6reg1 entered promiscuous mode [ 325.550900][T12020] device veth0_vlan left promiscuous mode [ 325.626160][T12020] device veth0_vlan entered promiscuous mode [ 326.076341][T12031] device pim6reg1 entered promiscuous mode [ 326.317092][T12044] device pim6reg1 entered promiscuous mode [ 326.645766][T12066] device veth0_vlan left promiscuous mode [ 326.719612][T12066] device veth0_vlan entered promiscuous mode [ 326.956422][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 326.980914][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 327.016370][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 327.095949][T12075] device pim6reg1 entered promiscuous mode [ 327.516848][T12112] device pim6reg1 entered promiscuous mode [ 328.114760][T12132] syz.6.3410[12132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.114819][T12132] syz.6.3410[12132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.608652][T12153] device pim6reg1 entered promiscuous mode [ 328.784125][ T24] audit: type=1400 audit(1732128493.290:180): avc: denied { create } for pid=12162 comm="syz.6.3418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 328.980031][T12181] device pim6reg1 entered promiscuous mode [ 329.078797][T12185] tun0: tun_chr_ioctl cmd 1074025676 [ 329.096063][T12185] tun0: owner set to 0 [ 329.132170][T12183] device pim6reg1 entered promiscuous mode [ 329.491256][T12198] device veth0_vlan left promiscuous mode [ 329.543051][T12198] device veth0_vlan entered promiscuous mode [ 330.072113][T12217] device sit0 left promiscuous mode [ 330.565947][T12226] device pim6reg1 entered promiscuous mode [ 330.613833][T12238] device syzkaller0 entered promiscuous mode [ 330.967793][T12256] syz.6.3449[12256] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.967855][T12256] syz.6.3449[12256] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.060612][T12257] tap0: tun_chr_ioctl cmd 1074025677 [ 331.097951][T12257] tap0: linktype set to 780 [ 331.887570][T12309] device syzkaller0 entered promiscuous mode [ 332.490745][T12343] device wg2 entered promiscuous mode [ 333.293000][T12381] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.300092][T12381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.308959][T12381] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.315996][T12381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.462953][T12381] device bridge0 entered promiscuous mode [ 333.554626][T12386] device pim6reg1 entered promiscuous mode [ 333.670070][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.804439][T12389] device pim6reg1 entered promiscuous mode [ 333.914275][T12395] device pim6reg1 entered promiscuous mode [ 334.067684][T12401] device syzkaller0 entered promiscuous mode [ 334.131327][ T4976] syzkaller0: tun_net_xmit 48 [ 334.420514][T12405] device veth0_vlan left promiscuous mode [ 334.426724][T12405] device veth0_vlan entered promiscuous mode [ 336.445519][T12503] device pim6reg1 entered promiscuous mode [ 337.184031][ T24] audit: type=1400 audit(1732128501.690:181): avc: denied { create } for pid=12527 comm="syz.6.3523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 337.701530][T12547] device syzkaller0 entered promiscuous mode [ 337.768503][T12552] device sit0 entered promiscuous mode [ 338.084356][T12572] device wg2 left promiscuous mode [ 338.159718][T12572] device wg2 entered promiscuous mode [ 339.501493][T12630] syz.5.3549[12630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.501555][T12630] syz.5.3549[12630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.022830][T12663] syz.8.3560[12663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.142567][T12663] syz.8.3560[12663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.268622][T12667] device pim6reg1 entered promiscuous mode [ 340.271707][T12666] syz.8.3560[12666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.347240][T12663] syz.8.3560[12663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.364835][T12666] syz.8.3560[12666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.963059][T12697] device veth1_macvtap left promiscuous mode [ 341.082076][T12697] device macsec0 left promiscuous mode [ 341.217719][T12699] device pim6reg1 entered promiscuous mode [ 341.490329][T12716] device pim6reg1 entered promiscuous mode [ 343.303892][T12810] device syzkaller0 entered promiscuous mode [ 343.653660][T12834] device pim6reg1 entered promiscuous mode [ 345.589629][T12884] device pim6reg1 entered promiscuous mode [ 346.848161][ T24] audit: type=1400 audit(1732128511.350:182): avc: denied { create } for pid=12906 comm="syz.6.3635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 346.914255][T12907] GPL: port 1(erspan0) entered blocking state [ 346.993650][T12907] GPL: port 1(erspan0) entered disabled state [ 347.015503][T12907] device erspan0 entered promiscuous mode [ 347.090275][T12920] GPL: port 1(erspan0) entered blocking state [ 347.096198][T12920] GPL: port 1(erspan0) entered forwarding state [ 347.164652][T12927] device pim6reg1 entered promiscuous mode [ 348.140580][T12947] device syzkaller0 entered promiscuous mode [ 348.207649][T12952] device veth0_vlan left promiscuous mode [ 348.366079][T12952] device veth0_vlan entered promiscuous mode [ 349.263195][T12981] device veth0_vlan left promiscuous mode [ 349.275672][T12981] device veth0_vlan entered promiscuous mode [ 351.883170][T13070] device wg2 entered promiscuous mode [ 352.798631][T13091] device pim6reg1 entered promiscuous mode [ 353.309692][T13127] syz.6.3699[13127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.309775][T13127] syz.6.3699[13127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.007330][T13155] device syzkaller0 entered promiscuous mode [ 354.685123][T13186] device pim6reg1 entered promiscuous mode [ 355.652883][T13242] device syzkaller0 entered promiscuous mode [ 355.899558][T13250] device syzkaller0 entered promiscuous mode [ 355.992106][T13258] device wg2 left promiscuous mode [ 356.018828][T13259] device wg2 entered promiscuous mode [ 357.202069][T13299] syz.6.3751[13299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.202134][T13299] syz.6.3751[13299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.687862][T13332] device pim6reg1 entered promiscuous mode [ 359.683043][T13387] device sit0 left promiscuous mode [ 359.871720][T13402] device sit0 entered promiscuous mode [ 360.543684][T13417] device pim6reg1 entered promiscuous mode [ 360.768074][T13432] device vxcan1 entered promiscuous mode [ 360.877184][T13444] device pim6reg1 entered promiscuous mode [ 361.035986][T13452] device pim6reg1 entered promiscuous mode [ 361.112204][T13456] device veth0_vlan left promiscuous mode [ 361.172147][T13456] device veth0_vlan entered promiscuous mode [ 361.327558][T13473] device pim6reg1 entered promiscuous mode [ 361.599237][T13485] device pim6reg1 entered promiscuous mode [ 363.694496][T13582] device syzkaller0 entered promiscuous mode [ 365.748008][T13677] device wg2 entered promiscuous mode [ 365.974062][T13689] device pim6reg1 entered promiscuous mode [ 366.065464][T13695] device pim6reg1 entered promiscuous mode [ 366.234808][T13710] bridge0: port 3(veth0_to_batadv) entered blocking state [ 366.252083][T13710] bridge0: port 3(veth0_to_batadv) entered disabled state [ 366.262795][T13710] device veth0_to_batadv entered promiscuous mode [ 366.275122][T13710] device veth0_to_batadv left promiscuous mode [ 366.281483][T13710] bridge0: port 3(veth0_to_batadv) entered disabled state [ 366.845134][T13741] device pim6reg1 entered promiscuous mode [ 367.217130][T13757] device pim6reg1 entered promiscuous mode [ 367.798043][T13793] ’ync_“–џ’Џ: renamed from ipvlan1 [ 367.848612][T13796] device pim6reg1 entered promiscuous mode [ 368.057022][T13799] device veth0_vlan left promiscuous mode [ 368.142372][T13799] device veth0_vlan entered promiscuous mode [ 368.229055][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 368.246777][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 368.258222][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 368.621081][T13836] device veth1_macvtap left promiscuous mode [ 368.626980][T13836] device macsec0 left promiscuous mode [ 368.719565][T13840] device veth1_macvtap entered promiscuous mode [ 368.740476][T13840] device macsec0 entered promiscuous mode [ 368.965648][T13860] device veth0_vlan left promiscuous mode [ 369.078598][T13860] device veth0_vlan entered promiscuous mode [ 369.345608][T13876] device syzkaller0 entered promiscuous mode [ 370.036317][T13897] device sit0 left promiscuous mode [ 370.114914][T13900] device sit0 entered promiscuous mode [ 370.888001][T13921] device sit0 entered promiscuous mode [ 371.421942][T13938] device wg2 left promiscuous mode [ 372.147150][T13989] device syzkaller0 entered promiscuous mode [ 372.923690][T14035] syz.6.3959[14035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.923747][T14035] syz.6.3959[14035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.207582][T14061] device pim6reg1 entered promiscuous mode [ 373.878555][T14099] syz.7.3975[14099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.878609][T14099] syz.7.3975[14099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.574502][T14133] device syzkaller0 entered promiscuous mode [ 374.751585][T14141] device pim6reg1 entered promiscuous mode [ 375.239508][T14151] : renamed from ipvlan1 [ 376.056137][T14170] device veth0_vlan left promiscuous mode [ 376.132953][T14170] device veth0_vlan entered promiscuous mode [ 376.302384][T14182] device syzkaller0 entered promiscuous mode [ 376.475810][T14197] џџџџџџ: renamed from vlan1 [ 377.328016][T14218] device pim6reg1 entered promiscuous mode [ 377.566362][T14226] device syzkaller0 entered promiscuous mode [ 377.806971][T14257] device syzkaller0 entered promiscuous mode [ 378.060793][T14277] tap0: tun_chr_ioctl cmd 2147767511 [ 378.212026][T14281] device sit0 left promiscuous mode [ 378.408516][T14283] device pim6reg1 entered promiscuous mode [ 378.968473][T14312] device wg2 left promiscuous mode [ 379.434553][T14346] device veth1_macvtap left promiscuous mode [ 379.440913][T14346] device macsec0 left promiscuous mode [ 379.575381][T14346] device veth1_macvtap entered promiscuous mode [ 379.625534][T14346] device macsec0 entered promiscuous mode [ 380.371681][T14387] device syzkaller0 entered promiscuous mode [ 380.381432][ T24] audit: type=1400 audit(1732128544.890:183): avc: denied { unlink } for pid=77 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 381.339606][T14431] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.346648][T14431] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.360227][T14431] device bridge0 left promiscuous mode [ 381.366709][T14432] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.373581][T14432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.380730][T14432] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.387584][T14432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.395703][T14432] device bridge0 entered promiscuous mode [ 381.485138][T14434] device pim6reg1 entered promiscuous mode [ 382.087598][T14479] device pim6reg1 entered promiscuous mode [ 382.727317][T14494] device syzkaller0 entered promiscuous mode [ 382.761436][T14494] geneve1: tun_chr_ioctl cmd 1074025672 [ 382.777719][T14494] geneve1: ignored: set checksum enabled [ 383.189074][T14546] device syzkaller0 entered promiscuous mode [ 384.737049][T14592] device veth0_vlan left promiscuous mode [ 384.743370][T14592] device veth0_vlan entered promiscuous mode [ 384.751151][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 384.804834][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 384.874263][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 385.562712][T14635] device sit0 left promiscuous mode [ 385.867033][T14645] device sit0 entered promiscuous mode [ 386.103356][T14666] device pim6reg1 entered promiscuous mode [ 386.199375][T14664] QБ6уз\b‹ЁY­4: renamed from lo [ 386.630612][T14688] device wg2 left promiscuous mode [ 386.943763][T14697] device pim6reg1 entered promiscuous mode [ 387.096028][T14704] device pim6reg1 entered promiscuous mode [ 387.670322][T14784] device pim6reg1 entered promiscuous mode [ 388.619134][T14829] device veth0_vlan left promiscuous mode [ 388.719679][T14829] device veth0_vlan entered promiscuous mode [ 389.023906][T14834] device veth0_vlan left promiscuous mode [ 389.076751][T14834] device veth0_vlan entered promiscuous mode [ 389.378799][T14857] syzkaller0: refused to change device tx_queue_len [ 390.383197][T14899] syz.8.4204[14899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.383248][T14899] syz.8.4204[14899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.579073][T14906] device veth0_vlan left promiscuous mode [ 390.708722][T14906] device veth0_vlan entered promiscuous mode [ 390.877810][T14919] device pim6reg1 entered promiscuous mode [ 391.245690][T14927] device pim6reg1 entered promiscuous mode [ 392.018982][T14960] device pim6reg1 entered promiscuous mode [ 393.876619][T15003] device pim6reg1 entered promiscuous mode [ 395.231203][T15032] device veth1_macvtap left promiscuous mode [ 395.237071][T15032] device macsec0 left promiscuous mode [ 396.834661][T15088] device syzkaller0 entered promiscuous mode [ 396.851938][T12558] syzkaller0: tun_net_xmit 48 [ 396.861939][T15088] syzkaller0: create flow: hash 1520423990 index 3 [ 396.991678][T15088] syzkaller0: delete flow: hash 1520423990 index 3 [ 397.163984][T15095] device pim6reg1 entered promiscuous mode [ 397.525873][T15121] device veth0_vlan left promiscuous mode [ 397.565243][T15121] device veth0_vlan entered promiscuous mode [ 397.766024][T15128] device pim6reg1 entered promiscuous mode [ 399.112192][T15169] device pim6reg1 entered promiscuous mode [ 399.349420][T15190] device pim6reg1 entered promiscuous mode [ 399.732607][T15208] device veth0_vlan left promiscuous mode [ 399.857791][T15208] device veth0_vlan entered promiscuous mode [ 402.288866][T15281] device veth1_macvtap left promiscuous mode [ 402.313328][T15281] device macsec0 left promiscuous mode [ 402.503794][T15294] device veth1_macvtap entered promiscuous mode [ 402.800657][T15320] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.807883][T15320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.885798][T15320] device bridge0 entered promiscuous mode [ 402.996742][T15339] device pim6reg1 entered promiscuous mode [ 403.091336][T15341] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 403.202081][T15341] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 403.539927][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 403.625549][T15370] €Т0: renamed from pim6reg1 [ 403.743787][T15375] device pim6reg1 entered promiscuous mode [ 404.380322][T15390] џџџџџџ: renamed from vlan1 [ 404.528853][T15395] device pim6reg1 entered promiscuous mode [ 404.814893][T15432] device sit0 left promiscuous mode [ 404.880464][T15437] tap0: tun_chr_ioctl cmd 1074025673 [ 405.076032][T15459] syz.8.4367[15459] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.076106][T15459] syz.8.4367[15459] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.457578][T15459] device syzkaller0 entered promiscuous mode [ 405.666157][T15471] device syzkaller0 entered promiscuous mode [ 406.216815][T15500] device pim6reg1 entered promiscuous mode [ 407.379330][T15566] syz.7.4396[15566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.379420][T15566] syz.7.4396[15566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.768935][T15583] device syzkaller0 entered promiscuous mode [ 408.117265][T15594] device pim6reg1 entered promiscuous mode [ 408.738607][T15612] device syzkaller0 entered promiscuous mode [ 409.403192][T15632] device pim6reg1 entered promiscuous mode [ 409.698249][T15652] device veth0_vlan left promiscuous mode [ 409.784509][T15652] device veth0_vlan entered promiscuous mode [ 409.888312][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 409.922935][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 409.983413][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 411.205832][T15681] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.280411][T15681] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.306998][T15681] device bridge_slave_0 entered promiscuous mode [ 411.332326][T15681] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.339269][T15681] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.347167][T15681] device bridge_slave_1 entered promiscuous mode [ 411.611590][T15681] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.618478][T15681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 411.625677][T15681] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.632438][T15681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.938689][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.948261][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.043038][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 412.080282][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 412.235349][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 412.270626][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 412.332624][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.339519][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 412.420509][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 412.479463][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 412.492510][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.499399][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.527446][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 412.544980][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 412.574130][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 412.582673][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 412.660212][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 412.668693][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 412.685942][T15681] device veth0_vlan entered promiscuous mode [ 412.704980][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 412.713409][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 412.721906][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 412.729232][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 412.782198][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 412.790395][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 412.849743][T15681] device veth1_macvtap entered promiscuous mode [ 412.904255][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 412.914117][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 412.959677][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 413.612880][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 413.626086][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 414.092948][T15772] device pim6reg1 entered promiscuous mode [ 414.111870][T15770] device syzkaller0 entered promiscuous mode [ 414.508811][T15789] device pim6reg1 entered promiscuous mode [ 415.767959][T15821] device pim6reg1 entered promiscuous mode [ 416.112675][T15831] device pim6reg1 entered promiscuous mode [ 416.832196][T15862] device pim6reg1 entered promiscuous mode [ 416.843954][T15862] FAULT_INJECTION: forcing a failure. [ 416.843954][T15862] name failslab, interval 1, probability 0, space 0, times 0 [ 416.857020][T15862] CPU: 1 PID: 15862 Comm: syz.7.4484 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 416.868245][T15862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 416.878139][T15862] Call Trace: [ 416.881259][T15862] dump_stack_lvl+0x1e2/0x24b [ 416.885754][T15862] ? bfq_pos_tree_add_move+0x43b/0x43b [ 416.891229][T15862] ? skb_trim+0x90/0x1b0 [ 416.895314][T15862] dump_stack+0x15/0x17 [ 416.899292][T15862] should_fail+0x3c6/0x510 [ 416.903551][T15862] ? netlink_trim+0x19b/0x230 [ 416.908066][T15862] __should_failslab+0xa4/0xe0 [ 416.912671][T15862] should_failslab+0x9/0x20 [ 416.917120][T15862] __kmalloc_track_caller+0x5f/0x320 [ 416.922229][T15862] ? netlink_trim+0x19b/0x230 [ 416.926805][T15862] pskb_expand_head+0x12b/0x1180 [ 416.931590][T15862] netlink_trim+0x19b/0x230 [ 416.935922][T15862] netlink_broadcast_filtered+0x66/0x1270 [ 416.941493][T15862] ? __kasan_check_write+0x14/0x20 [ 416.946528][T15862] ? rtmsg_ifinfo_build_skb+0xd4/0x180 [ 416.951801][T15862] nlmsg_notify+0x101/0x1c0 [ 416.956145][T15862] rtmsg_ifinfo+0xe7/0x120 [ 416.960392][T15862] dev_close_many+0x2a9/0x530 [ 416.964984][T15862] ? __dev_open+0x4e0/0x4e0 [ 416.969343][T15862] ? __kasan_check_read+0x11/0x20 [ 416.974184][T15862] unregister_netdevice_many+0x492/0x17d0 [ 416.979741][T15862] ? kmem_cache_free+0xa9/0x1e0 [ 416.984439][T15862] ? __kasan_check_write+0x14/0x20 [ 416.989372][T15862] ? __kasan_slab_free+0x11/0x20 [ 416.994146][T15862] ? alloc_netdev_mqs+0xcd0/0xcd0 [ 416.999013][T15862] ? __kasan_check_read+0x11/0x20 [ 417.003873][T15862] unregister_netdevice_queue+0x2e6/0x350 [ 417.009420][T15862] ? linkwatch_urgent_event+0x335/0x4d0 [ 417.014803][T15862] ? list_netdevice+0x4c0/0x4c0 [ 417.019494][T15862] __tun_detach+0xd14/0x1510 [ 417.023915][T15862] ? mutex_trylock+0xa0/0xa0 [ 417.028345][T15862] ? tun_chr_open+0x530/0x530 [ 417.032875][T15862] tun_chr_close+0x92/0x140 [ 417.037214][T15862] __fput+0x33d/0x7b0 [ 417.041026][T15862] ____fput+0x15/0x20 [ 417.044842][T15862] task_work_run+0x129/0x190 [ 417.049268][T15862] exit_to_user_mode_loop+0xbf/0xd0 [ 417.054298][T15862] syscall_exit_to_user_mode+0xa2/0x1a0 [ 417.059682][T15862] do_syscall_64+0x40/0x70 [ 417.063932][T15862] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 417.069654][T15862] RIP: 0033:0x7f6685b0f819 [ 417.074000][T15862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 417.093873][T15862] RSP: 002b:00007f6684188038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 417.102268][T15862] RAX: 0000000000000000 RBX: 00007f6685cc6fa0 RCX: 00007f6685b0f819 [ 417.110086][T15862] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 417.117874][T15862] RBP: 00007f6684188090 R08: 0000000000000000 R09: 0000000000000000 [ 417.125684][T15862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 417.133504][T15862] R13: 0000000000000000 R14: 00007f6685cc6fa0 R15: 00007fff3c9c4328 [ 417.241515][T15865] device pim6reg1 entered promiscuous mode [ 417.311962][T15869] device syzkaller0 entered promiscuous mode [ 418.530385][T15923] device syzkaller0 entered promiscuous mode [ 418.657236][T15924] device syzkaller0 entered promiscuous mode [ 418.720378][T15931] device pim6reg1 entered promiscuous mode [ 419.238169][T15952] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.253886][T15952] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.261825][T15952] device bridge_slave_0 entered promiscuous mode [ 419.268838][T15952] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.276412][T15952] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.284348][T15952] device bridge_slave_1 entered promiscuous mode [ 419.426010][T15952] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.433026][T15952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.440124][T15952] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.446891][T15952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.513610][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.533531][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.583951][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 419.606367][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 419.614067][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 419.623120][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 419.631610][ T2051] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.638491][ T2051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.646258][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 419.655613][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 419.664761][ T2051] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.671625][ T2051] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.679298][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 419.687669][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 419.695890][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 419.704224][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 419.713072][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 419.726008][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 419.734760][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 419.742860][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 419.806670][T15952] device veth0_vlan entered promiscuous mode [ 419.938457][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 419.946880][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 420.053019][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 420.070583][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 420.108116][T15978] device syzkaller0 entered promiscuous mode [ 420.150763][T15952] device veth1_macvtap entered promiscuous mode [ 420.244888][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 420.260528][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 420.289063][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 420.338983][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 420.360836][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 420.373557][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.383595][ T9] device bridge_slave_0 left promiscuous mode [ 420.389730][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.398606][ T9] device veth0_vlan left promiscuous mode [ 420.750544][T15994] syz.6.4529[15994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.750605][T15994] syz.6.4529[15994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.932379][T16090] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 424.994722][T16090] device syzkaller0 entered promiscuous mode [ 425.040063][T16097] device pim6reg1 entered promiscuous mode [ 425.174012][T16082] device syzkaller0 entered promiscuous mode [ 425.302387][T16115] device pim6reg1 entered promiscuous mode [ 426.385559][T16152] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 426.607638][T16152] device syzkaller0 entered promiscuous mode [ 426.978665][T16175] device pim6reg1 entered promiscuous mode [ 428.715669][T16228] device sit0 entered promiscuous mode [ 429.799297][T16281] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.806191][T16281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.813315][T16281] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.820166][T16281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.960472][T16281] device bridge0 entered promiscuous mode [ 429.984835][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 430.042984][T16302] device pim6reg1 entered promiscuous mode [ 430.129254][T16304] device pim6reg1 entered promiscuous mode [ 430.150929][T16304] syz.6.4617[16304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.150994][T16304] syz.6.4617[16304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.533297][T16314] syz.6.4621[16314] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.555057][T16314] syz.6.4621[16314] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.015717][T16334] device syzkaller0 entered promiscuous mode [ 431.161117][T16338] device wg2 entered promiscuous mode [ 431.350524][T16351] device pim6reg1 entered promiscuous mode [ 431.377502][T16349] syz.5.4629[16349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.377566][T16349] syz.5.4629[16349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.723713][T16359] device pim6reg1 entered promiscuous mode [ 432.486243][T16375] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.493238][T16375] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.562722][T16375] device bridge0 left promiscuous mode [ 432.901125][T16371] device veth0_vlan left promiscuous mode [ 432.970351][T16371] device veth0_vlan entered promiscuous mode [ 433.039046][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 433.050681][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 433.083157][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 433.125884][T16384] device pim6reg1 entered promiscuous mode [ 433.179805][T16391] device syzkaller0 entered promiscuous mode [ 433.243455][T16392] device pim6reg1 entered promiscuous mode [ 433.302658][T16393] syz.6.4641[16393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.302735][T16393] syz.6.4641[16393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.240271][T16414] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 434.395376][T16414] device syzkaller0 entered promiscuous mode [ 435.321309][T16443] device pim6reg1 entered promiscuous mode [ 435.370846][T16443] syz.5.4654[16443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.370911][T16443] syz.5.4654[16443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.609688][T16449] device veth0_vlan left promiscuous mode [ 435.647193][T16449] device veth0_vlan entered promiscuous mode [ 435.754473][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 435.780988][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 435.798910][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 436.534698][T16491] device syzkaller0 entered promiscuous mode [ 436.616808][T16499] device pim6reg1 entered promiscuous mode [ 437.014673][T16511] device pim6reg1 entered promiscuous mode [ 437.064700][T16511] syz.9.4674[16511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.064760][T16511] syz.9.4674[16511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.859355][T16519] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.981376][T16519] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.988718][T16519] device bridge_slave_0 entered promiscuous mode [ 438.191813][T16533] device sit0 left promiscuous mode [ 438.428258][T16534] device sit0 entered promiscuous mode [ 438.626840][T16519] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.636331][T16519] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.648519][T16519] device bridge_slave_1 entered promiscuous mode [ 438.830088][T16546] device syzkaller0 entered promiscuous mode [ 439.714689][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 439.780227][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 439.904968][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 439.971306][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.030640][T16001] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.037546][T16001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.149447][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 440.192684][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.208572][T16001] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.215476][T16001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.225450][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 440.278528][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 440.400254][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 440.480368][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 440.492070][T16574] device veth0_vlan left promiscuous mode [ 440.531916][T16574] device veth0_vlan entered promiscuous mode [ 440.624726][T16519] device veth0_vlan entered promiscuous mode [ 440.724343][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 440.762601][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 440.861929][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 440.940451][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 441.030140][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 441.060028][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 441.068278][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.141635][T16582] device pim6reg1 entered promiscuous mode [ 441.154536][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.162549][T16581] syz.6.4694[16581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.162609][T16581] syz.6.4694[16581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.176266][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.334373][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 441.342728][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 441.375635][ T2051] device veth0_vlan left promiscuous mode [ 441.560444][T16519] device veth1_macvtap entered promiscuous mode [ 441.625886][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 441.633879][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 441.642115][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 441.664465][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 441.697317][T16001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 441.863783][ T24] audit: type=1400 audit(1732128606.370:184): avc: denied { setattr } for pid=16604 comm="syz.7.4700" path="/net/tun" dev="devtmpfs" ino=146 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 442.219240][T16610] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.227141][T16610] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.234734][T16610] device bridge_slave_0 entered promiscuous mode [ 442.242039][T16610] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.249018][T16610] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.257256][T16610] device bridge_slave_1 entered promiscuous mode [ 442.811850][T16610] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.818724][T16610] bridge0: port 2(bridge_slave_1) entered forwarding state [ 442.825852][T16610] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.832623][T16610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.856482][T16631] device pim6reg1 entered promiscuous mode [ 442.871340][T16631] syz.9.4707[16631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.871398][T16631] syz.9.4707[16631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.927277][ T2051] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.953971][ T2051] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.966021][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 442.978922][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 443.086733][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 443.125174][ T2051] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.132053][ T2051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.230467][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 443.331975][ T2051] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.338852][ T2051] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.426257][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 443.450711][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 443.466573][T16648] device pim6reg1 entered promiscuous mode [ 443.540892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 443.584108][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 443.680742][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 443.689411][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 443.698274][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 443.715576][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 443.743159][T16610] device veth0_vlan entered promiscuous mode [ 443.807659][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 443.816693][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 443.903458][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 443.930228][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 443.966283][T16610] device veth1_macvtap entered promiscuous mode [ 444.008907][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 444.020636][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 444.038971][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 444.060376][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 444.088969][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 444.415750][T16680] syz.5.4720[16680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.415809][T16680] syz.5.4720[16680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.555092][T16683] device veth0_vlan left promiscuous mode [ 444.631961][T16683] device veth0_vlan entered promiscuous mode [ 444.831454][T16702] device veth1_macvtap left promiscuous mode [ 445.176114][T16713] device syzkaller0 entered promiscuous mode [ 445.325973][T16720] syz.6.4733[16720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.326034][T16720] syz.6.4733[16720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.353842][T16757] syz.5.4744[16757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.385736][T16757] syz.5.4744[16757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.548890][T16763] device pim6reg1 entered promiscuous mode [ 446.909437][T16783] device veth0_vlan left promiscuous mode [ 447.021799][T16783] device veth0_vlan entered promiscuous mode [ 447.168625][T16788] device syzkaller0 entered promiscuous mode [ 447.573361][T16803] device pim6reg1 entered promiscuous mode [ 448.446824][T16829] device vlan1 entered promiscuous mode [ 448.831932][T16845] device pim6reg1 entered promiscuous mode [ 449.123515][T16873] device pim6reg1 entered promiscuous mode [ 449.292546][T16903] device pim6reg1 entered promiscuous mode [ 449.761688][T16931] device veth1_macvtap left promiscuous mode [ 449.991599][T16943] device pim6reg1 entered promiscuous mode [ 450.263581][T16944] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.270505][T16944] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.277774][T16944] device bridge_slave_0 entered promiscuous mode [ 450.284827][T16944] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.297189][T16944] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.310619][T16944] device bridge_slave_1 entered promiscuous mode [ 450.630535][T16944] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.637430][T16944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.644542][T16944] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.651418][T16944] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.690771][T16001] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.700270][T16001] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.823782][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 450.841384][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 450.951598][T16985] dvmrp1: tun_chr_ioctl cmd 1074025673 [ 450.957010][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 450.966578][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 450.976861][ T2051] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.983760][ T2051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.991809][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 451.000543][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 451.008777][ T2051] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.015643][ T2051] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.031068][T16983] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 451.036526][T16983] dvmrp1: linktype set to 768 [ 451.071022][T16988] device pim6reg1 entered promiscuous mode [ 451.121479][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 451.150554][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 451.158500][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 451.167318][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 451.199025][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 451.228151][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 451.303965][T16944] device veth0_vlan entered promiscuous mode [ 451.465022][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 451.508383][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 451.518852][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 451.526464][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 451.595356][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 451.610625][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 451.653002][T16944] device veth1_macvtap entered promiscuous mode [ 451.675676][T17007] device pim6reg1 entered promiscuous mode [ 451.709496][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 451.724308][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 451.753781][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 451.816126][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 451.882139][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 451.953792][T17017] device syzkaller0 entered promiscuous mode [ 451.964016][T17019] device syzkaller0 entered promiscuous mode [ 452.166641][T17013] device syzkaller0 entered promiscuous mode [ 452.323143][T17024] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.330201][T17024] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.638861][T17019] device veth1_macvtap left promiscuous mode [ 452.710002][T17025] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.716899][T17025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.724023][T17025] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.730878][T17025] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.746782][T17025] device bridge0 entered promiscuous mode [ 452.764176][T17037] device veth0_to_bond entered promiscuous mode [ 452.976893][T17045] device pim6reg1 entered promiscuous mode [ 453.027906][T17047] device pim6reg1 entered promiscuous mode [ 453.465211][ T9] device bridge_slave_1 left promiscuous mode [ 453.479056][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.500540][ T9] device bridge_slave_0 left promiscuous mode [ 453.506525][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.520904][ T9] device veth0_vlan left promiscuous mode [ 453.716780][T17067] device veth1_macvtap left promiscuous mode [ 453.804688][T17072] device pim6reg1 entered promiscuous mode [ 453.812307][T17070] device veth1_macvtap entered promiscuous mode [ 453.818500][T17070] device macsec0 entered promiscuous mode [ 454.023259][T17099] device veth1_macvtap entered promiscuous mode [ 454.030859][T17099] device macsec0 entered promiscuous mode [ 454.094301][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 454.393443][T17119] device pim6reg1 entered promiscuous mode [ 454.512977][T17123] device syzkaller0 entered promiscuous mode [ 454.820163][T17160] device pim6reg1 entered promiscuous mode [ 455.592682][T17202] device syzkaller0 entered promiscuous mode [ 455.970179][T17246] device pim6reg1 entered promiscuous mode [ 455.992857][T17243] device pim6reg1 entered promiscuous mode [ 457.826018][T17293] device veth0_vlan left promiscuous mode [ 457.842760][T17293] device veth0_vlan entered promiscuous mode [ 458.141899][T17310] syz.6.4907[17310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 458.142283][T17310] syz.6.4907[17310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 458.937946][T17341] device pim6reg1 entered promiscuous mode [ 459.005416][T17344] syz.7.4916[17344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.005481][T17344] syz.7.4916[17344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.130536][T17343] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.148846][T17343] bridge0: port 1(bridge_slave_0) entered disabled state [ 459.185642][T17343] device bridge0 left promiscuous mode [ 459.193243][T17345] device bridge_slave_1 left promiscuous mode [ 459.199400][T17345] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.227622][T17345] device bridge_slave_0 left promiscuous mode [ 459.260088][T17345] bridge0: port 1(bridge_slave_0) entered disabled state [ 459.338780][T17349] device pim6reg1 entered promiscuous mode [ 459.654659][T17360] device pim6reg1 entered promiscuous mode [ 460.063240][T17394] device pim6reg1 entered promiscuous mode [ 460.117804][T17387] syz.5.4931[17387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.117865][T17387] syz.5.4931[17387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.598785][T17409] device syzkaller0 entered promiscuous mode [ 461.206743][T17422] device sit0 entered promiscuous mode [ 461.904959][T17440] device veth0_vlan left promiscuous mode [ 461.920644][T17440] device veth0_vlan entered promiscuous mode [ 461.927706][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 461.959745][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 462.013052][ T2051] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 462.740955][ T24] audit: type=1400 audit(1732128627.250:185): avc: denied { read } for pid=17473 comm="poweroff" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 462.895244][T17479] device syzkaller0 entered promiscuous mode [ 463.643060][T17524] device pim6reg1 entered promiscuous mode [ 463.729949][T17527] syz.6.4969[17527] is installing a program with bpf_probe_write_user helper that may corrupt user memory! Connection to 10.128.1.82 closed by remote host. [ 463.730020][T17527] syz.6.4969[17527] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.681450][T17552] device pim6reg1 entered promiscuous mode [ 464.974630][T17563] device pim6reg1 entered promiscuous mode [ 465.385337][ T24] audit: type=1400 audit(1732128629.890:186): avc: denied { read } for pid=17582 comm="syz.9.4983" dev="nsfs" ino=4026532415 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 465.431724][T17593] syz.7.4985[17593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.431789][T17593] syz.7.4985[17593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.445740][ T24] audit: type=1400 audit(1732128629.890:187): avc: denied { open } for pid=17582 comm="syz.9.4983" path="net:[4026532415]" dev="nsfs" ino=4026532415 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 465.640801][ T24] audit: type=1400 audit(1732128630.090:188): avc: denied { search } for pid=17604 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 465.745536][ T24] audit: type=1400 audit(1732128630.090:189): avc: denied { write } for pid=17604 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 465.834652][ T24] audit: type=1400 audit(1732128630.090:190): avc: denied { add_name } for pid=17604 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 465.871374][ T24] audit: type=1400 audit(1732128630.090:191): avc: denied { create } for pid=17604 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 466.039224][ T24] audit: type=1400 audit(1732128630.090:192): avc: denied { read open } for pid=17604 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=20194 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 466.147110][ T24] audit: type=1400 audit(1732128630.090:193): avc: denied { lock } for pid=17604 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=20194 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 466.196730][ T24] audit: type=1400 audit(1732128630.110:194): avc: denied { search } for pid=133 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 467.283991][T17667] device veth0_vlan left promiscuous mode [ 467.295344][T17667] device veth0_vlan entered promiscuous mode [ 467.321312][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.340640][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 467.363118][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 467.969220][T17709] device wg2 entered promiscuous mode [ 468.727317][T17734] device syzkaller0 entered promiscuous mode [ 468.905804][T17740] device syzkaller0 entered promiscuous mode [ 470.300901][ T9] device bridge_slave_1 left promiscuous mode [ 470.307075][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.314355][ T9] device bridge_slave_0 left promiscuous mode [ 470.320364][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.327969][ T9] device bridge_slave_1 left promiscuous mode [ 470.333972][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.341281][ T9] device bridge_slave_0 left promiscuous mode [ 470.347184][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.354866][ T9] device bridge_slave_1 left promiscuous mode [ 470.360882][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.368327][ T9] device bridge_slave_0 left promiscuous mode [ 470.374399][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.382974][ T9] device veth1_macvtap left promiscuous mode [ 470.389002][ T9] device veth0_vlan left promiscuous mode [ 470.394731][ T9] device veth1_macvtap left promiscuous mode [ 470.400696][ T9] device veth0_vlan left promiscuous mode [ 470.409572][ T9] device veth1_macvtap left promiscuous mode [ 470.415789][ T9] device veth0_vlan left promiscuous mode [ 471.024799][T17749] kvm: exiting hardware virtualization [ 471.031267][T17749] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 471.038162][T17749] ACPI: Preparing to enter system sleep state S5 [ 471.044637][T17749] reboot: Power down serialport: VM disconnected.