last executing test programs: 31.814900388s ago: executing program 3 (id=855): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00"/12, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000001000008500000095000000b7000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xf7, &(0x7f0000001e40)=""/4093, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x26) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) socketpair(0x1f, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/14], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000048000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000a40)=ANY=[@ANYRESOCT, @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095", @ANYBLOB="18ddcb9ad223607b816e747d81220793f9fb420d7d35bdd325e4ddbd9d3a31b57522303b88a8052415f3e659fa2347c0241a6bf460deb756267afb05fef749182c5944670776ac4f613f12e1bef96e025a09a40803c9d26eaa5c1626d9935efdfabcd3c7aa1aef69c256cdad4063949c80c074fc6b3c59c75618ad", @ANYRESOCT=r4, @ANYBLOB="1c6faf5d20de2878197eb96a2e747b864ea8072c4387b5e24536be57750b227271d8fd36d6208bb4cfa3e35ec71009e2f599fb722e46eaea04f3de578d6e1a4de91fb54b82a46c4d9e18f21bc426480754"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000001080)}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000001240)='ifs_status\x00'}, 0x10) 31.668700829s ago: executing program 3 (id=861): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x5, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') recvmsg(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="92", 0xfdef}], 0x1}, 0x0) 31.56066125s ago: executing program 3 (id=864): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0)={0x0, 0x0}, 0x8) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xf, 0x2, &(0x7f00000002c0)=@raw=[@btf_id={0x18, 0x6, 0x3, 0x0, 0x5}], &(0x7f0000000300)='GPL\x00', 0x0, 0x40, &(0x7f00000004c0)=""/64, 0x41100, 0x3, '\x00', 0x0, @fallback=0x66, r2, 0x8, &(0x7f0000000540)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0xb, 0x8b}, 0x10, r3, 0xffffffffffffffff, 0x1, &(0x7f0000000600)=[r1, r1, r1, r4], &(0x7f0000000640)=[{0x2, 0x1, 0xd, 0x6}], 0x10, 0x8, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r1, 0x58, &(0x7f0000000740)}, 0x10) sendmsg$tipc(r0, &(0x7f0000000800)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe50}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000840)}], 0x5, 0x0, 0x0, 0x8880}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x60000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x800, 0x17dd}, 0x18040, 0x0, 0x0, 0x7, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x3, 0xfe, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x14}, 0x0, 0x7, 0x0, 0x0, 0x34, 0x2}, 0x0, 0x7, 0xffffffffffffffff, 0x9) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba880100000048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c27", 0x39}], 0x1}, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) (async) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) close(r6) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESOCT], 0xfdef) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xfffffffe, 0x5, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) 31.53730285s ago: executing program 3 (id=866): bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xb, '\x00', r2, r1, 0x0, 0x4, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}]}, &(0x7f0000000280)='syzkaller\x00', 0x6, 0x9d, &(0x7f00000003c0)=""/157, 0x41100, 0x1, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x4, 0x10, 0x9, 0x5aa9}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000004c0)=[r3], &(0x7f0000000500)=[{0x3, 0x1, 0x6, 0x9}, {0x2, 0x1, 0xc, 0xc}], 0x10, 0x4, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r0}, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x1d, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) sendmsg$tipc(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba8839", 0x5}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0xc, 0xffff, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000200)={r9, &(0x7f0000000240), 0x20000000}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r10}, 0x0, &(0x7f0000000040)}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r12, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="b0ff04c66b0d698cb89e2fe086dd1f74ffff06000000fe80000000000000ac14140746647b7954c4c06b580febc28eb143d0f6c0bad62c67a04402ba4125c7024f63fdb0b6c8ee826b4dfe6042a2f057c66cad677d850ea9928bcfcb47e585e427746ed3b27c40060cbd030a6d675c9926af53cd3085b24f9b7a486775c4f284f8c5a572ca115bce90c0ee9d4e7a07f5f1518092cb1f156694036f6618a59196631e6303fd5307d1112601d3641c9492f7dc3503416836b14590c53b1fc1ac149b70cc1142d6bc57fc3a76839fa2f96878b520fedfb9f64d81584a2e85ab4f6ec718b02d78f2ebf04e6b3b94610a21616181629a03c3dc0bf05e0a71f887833b81db7a10bc53259cb80716f6804934a411d424c1db98d454be1adb2776fdbb92b299d3b80af6987a871b4549fdb4c8297ee31ad925c8b0fb1a9d2589b08ed52602cbc26b56df71201bc4ea8621c56f33d251c1d4589af2dcd78fbb4e34bde02cb3920a30cee9489ee72c3e19304c16c2110e1839712d484b80abe77786a7e2ba834874a4e16b93dd07297554a06c2ad2c906f8ebb1db8730df096709184728d48f0a806696bd0d4b12d0064b933d9675353dae77fe8419451f85da63be78b70ca2a84a77f572d9f289d4313e6f6039fe756ac13a5d08838315dff44cda433cc7bc6b77449f8c", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r9, &(0x7f0000000500), 0x0}, 0x20) r13 = gettid() perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0xf1, 0xe, 0xfe, 0x0, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000480)}, 0x10c000, 0xffffffffffffffc0, 0x80000000, 0x7, 0x9, 0xffffffff, 0x5, 0x0, 0xfff, 0x0, 0x4959}, r13, 0xffffffffffffffff, r6, 0xb) 31.164732281s ago: executing program 3 (id=870): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00"/12, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000001000008500000095000000b7000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xf7, &(0x7f0000001e40)=""/4093, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x26) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) socketpair(0x1f, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/15], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000048000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000a40)=ANY=[@ANYRESOCT, @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095", @ANYBLOB="18ddcb9ad223607b816e747d81220793f9fb420d7d35bdd325e4ddbd9d3a31b57522303b88a8052415f3e659fa2347c0241a6bf460deb756267afb05fef749182c5944670776ac4f613f12e1bef96e025a09a40803c9d26eaa5c1626d9935efdfabcd3c7aa1aef69c256cdad4063949c80c074fc6b3c59c75618ad", @ANYRESOCT=r4, @ANYBLOB="1c6faf5d20de2878197eb96a2e747b864ea8072c4387b5e24536be57750b227271d8fd36d6208bb4cfa3e35ec71009e2f599fb722e46eaea04f3de578d6e1a4de91fb54b82a46c4d9e18f21bc426480754"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000001080)}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000001240)='ifs_status\x00'}, 0x10) 30.976983052s ago: executing program 3 (id=880): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000380)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000280), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_freezer_state(r1, &(0x7f0000000040)='FROZEN\x00', 0x7) r3 = openat$cgroup_procs(r0, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x6a, 0x6, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000570000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r7}, 0x8) ioctl$SIOCSIFHWADDR(r6, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r8, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 22.032955332s ago: executing program 2 (id=1113): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0xfff, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') 21.966864972s ago: executing program 2 (id=1116): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=0x0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=0x0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd6372ce22fdb911"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000), 0x3a) (async) write$cgroup_subtree(r2, &(0x7f0000000000), 0x3a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r8}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r8, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r9], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c9341, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) 21.353695275s ago: executing program 0 (id=1129): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0a00000016000000b40000007f00000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 `\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xa6, 0x9, 0x1ff, 0x4000, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x8, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0xe, &(0x7f0000000500)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @call={0x85, 0x0, 0x0, 0x55}], &(0x7f0000000200)='GPL\x00', 0xcfe, 0xc6, &(0x7f0000000700)=""/198, 0x41000, 0x1, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x2, 0xe, 0x9, 0x5cb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[r1, r3, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x49, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x43, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000080), 0x12) write$cgroup_int(r6, &(0x7f0000000100)=0x1, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000600000b00000002000093070000001000000004000000000000000100000084000000c8a2000000be5f616100db1764d350ff26836c3e9db3fd3a02d85f034a1673edbc168aafb69acc87e1c82a26b847763e40687fa11457ef0f769140f4cd6e7c8d1a7af67da9168a7e5b67ff"], &(0x7f0000000580)=""/180, 0x42, 0xb4, 0x0, 0x6, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000790000000000000018000000000000000000000021000000950000000000000005000000000000009500000000000000f9e3d2fb113f53c361c3543f7b67d987480a053481c2c608d406cdeec27156b8d8a304b5632dc50faf46fc7e7d67f830178cf5478f1aba0799450e38e040300200000000000000bec422c2cc5e56be4599b03ba228fe302239966a8910c72235507355f460e1148a8521ade6ce0379a5643fc8f66dd138a02c5418352bcf6694070a1c9aa56c457cb4f97be7a2c0f6ac7e8b3e7e422c0580904e0d657a2f47310d291ea2171daf6c734fa2cf7ec5599cf24cbc1cb463ee40aaf1de8262c1dd3eccd7406fa25fed928e835fb105c7f3925a2afa9eb3283fef94aa33078da4d1e921e54da61ce3e26a"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x21) 21.248607915s ago: executing program 0 (id=1132): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00002000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 21.191483566s ago: executing program 0 (id=1134): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x5, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') recvmsg(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="92", 0xfdef}], 0x1}, 0x0) 21.134102776s ago: executing program 0 (id=1136): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001340)={0xffffffffffffffff, 0xe0, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f00000010c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x7a, &(0x7f0000001140)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001180), &(0x7f00000011c0), 0x8, 0x7f, 0x8, 0x8, &(0x7f0000001200)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001400)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001400)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001500)={{0x1}, &(0x7f0000001480), &(0x7f00000014c0)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001500)={{0x1, 0xffffffffffffffff}, &(0x7f0000001480), &(0x7f00000014c0)}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001540)=@bloom_filter={0x1e, 0x401, 0xfffffff7, 0x6, 0x44, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0xc, @void, @value, @void, @value}, 0x50) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001600)=@generic={&(0x7f00000015c0)='./file0\x00', 0x0, 0x38}, 0x18) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001600)=@generic={&(0x7f00000015c0)='./file0\x00', 0x0, 0x38}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000016c0)={{}, &(0x7f0000001640), &(0x7f0000001680)='%pK \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000016c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001640), &(0x7f0000001680)='%pK \x00'}, 0x20) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001700)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xb, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001840)={0x11, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x10}, [@ldst={0x1, 0x2, 0x2, 0x8, 0x1, 0x2, 0x5}, @jmp={0x5, 0x1, 0xc, 0x1, 0x4, 0xffffffffffffffc0, 0x4}]}, &(0x7f0000000040)='syzkaller\x00', 0x8000, 0x1000, &(0x7f0000000080)=""/4096, 0x41000, 0x4, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000013c0)={0x2, 0x5, 0xf, 0x800}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001780)=[0xffffffffffffffff, r1, r2, r3, r4, r5, r6, 0x1], &(0x7f00000017c0)=[{0x5, 0x4, 0x5, 0xc}, {0x2, 0x1, 0x9, 0x2}, {0x2, 0x3, 0x0, 0xa}, {0x1, 0x4, 0x1, 0xb}, {0x4, 0x4, 0x0, 0x1}, {0x2, 0x3, 0x4, 0x2}, {0x0, 0x1, 0xd, 0x4}], 0x10, 0x7, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001840)={0x11, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x10}, [@ldst={0x1, 0x2, 0x2, 0x8, 0x1, 0x2, 0x5}, @jmp={0x5, 0x1, 0xc, 0x1, 0x4, 0xffffffffffffffc0, 0x4}]}, &(0x7f0000000040)='syzkaller\x00', 0x8000, 0x1000, &(0x7f0000000080)=""/4096, 0x41000, 0x4, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000013c0)={0x2, 0x5, 0xf, 0x800}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001780)=[0xffffffffffffffff, r1, r2, r3, r4, r5, r6, 0x1], &(0x7f00000017c0)=[{0x5, 0x4, 0x5, 0xc}, {0x2, 0x1, 0x9, 0x2}, {0x2, 0x3, 0x0, 0xa}, {0x1, 0x4, 0x1, 0xb}, {0x4, 0x4, 0x0, 0x1}, {0x2, 0x3, 0x4, 0x2}, {0x0, 0x1, 0xd, 0x4}], 0x10, 0x7, @void, @value}, 0x94) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000001900), 0x8) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000001940), 0x1, 0x0) recvmsg$unix(r7, &(0x7f0000001bc0)={&(0x7f0000001980), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001a00)=""/129, 0x81}], 0x1, &(0x7f0000001b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}, 0x10000) ioctl$TUNSETVNETBE(r9, 0x400454de, &(0x7f0000001c00)=0x1) socketpair(0x10, 0x802, 0xffffffff, &(0x7f0000001c40)) (async) socketpair(0x10, 0x802, 0xffffffff, &(0x7f0000001c40)) openat$cgroup_type(r13, &(0x7f0000001c80), 0x2, 0x0) (async) openat$cgroup_type(r13, &(0x7f0000001c80), 0x2, 0x0) write$cgroup_devices(r10, &(0x7f0000001cc0)={'c', ' *:* ', 'wm\x00'}, 0x9) (async) write$cgroup_devices(r10, &(0x7f0000001cc0)={'c', ' *:* ', 'wm\x00'}, 0x9) r18 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001dc0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000001d40)={0x3, 0x80, 0x7, 0x20, 0x6, 0x1, 0x0, 0xb5, 0x20001, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000001d00), 0xa}, 0x1300, 0x6e, 0xfffffff9, 0x8, 0x5864, 0x0, 0x8, 0x0, 0xb, 0x0, 0x5}, r18, 0x2, r14, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001e00)) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000021c0)={&(0x7f0000001e40)="6235b11e60f59960eb09e6ce534271abac46286ba3b922d427c93336cd682e0e68c5f6db6c080c09ba7905b6525a955c0d938dc8ff2b8b67ea839db0fd694e9bc7db2b95cf8d4b268b10c24cdc80f8c822d7595525091e9752c2f850e5aa433da3a1b5b4a477db179a8e4aab0b81f4f2847eb7fc3992d8763a06b6fa06b2b7a44fe70539a288512022945e39d3c699fd36d84a4b80f9ebbb1afa51da2ca71db97a8ce7fd44117fea7bcd7d7f8cad3214f331963feed837e2742a97fcb93f7ecbe5014a4b209eabe4", &(0x7f0000001f40)=""/142, &(0x7f0000002000)="f3ec2a8155ad4898926802ebd435a481e2eab4b87bb24b03e3301c1442fd2fbc4ce6d93957563c1041813f626c93f75d57d358c6d061f7fe03aacc8c4bceda332d672535425509b1d81b1fe14be93ec403b068f64dd3cf81e0d2f9f5f146a387e2a7aa4cc8620c54d4eff8d8a1d8ac6554ae64022974f118291b9c5f28540db3aa3df3f3519bbbd33e21bcf29d27de1e9908189c60f94b880067e4eb7893740cd197e9ee8b676f6a182101c73db231e064f8abf3f891972bc564ee18e942b2750c2894907e4863a0ff17fd3d46af9e32dda1fdc75dc5e598eff0b78eafaccf6b8bb8c439cd6a3cd0a2952a79d019cdebbfce222e0310b4129b", &(0x7f0000002100)="19a28a4e009d4cb321060b5af6974abe1473e05305eab0739cdd8f4bc4defe4be5ba44f18892aeb7c0389ce7eb298b871c886995e3ffe7fab9a7586808f63d01c31ba84b5c559fc4fbcc16892638fbb4613660b0d60302d5e4171ec4433500b2db26280b5265419a6088508befe346e2e327f8258f98cd4e7f7eb130cf05ec9fdbf832e74069d90ec062b4c017ab7c03d473a6277b0c72a512b19055342a2ba2c0f06950ca454f400803b26d5d2730172245fca31b3a5cdfcaf86f7c74d29b", 0x8, r4, 0x4}, 0x38) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002200)='./cgroup/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002280)={&(0x7f0000002240)='afs_folio_dirty\x00', r11, 0x0, 0x7fffffff}, 0x18) sendmsg$inet(r17, &(0x7f0000003780)={&(0x7f00000022c0)={0x2, 0x4e20, @rand_addr=0x64010100}, 0x10, &(0x7f00000035c0)=[{&(0x7f0000002300)="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", 0xfa}, {&(0x7f0000002400)="87df039a50658f7478567258951a171b4e0220c0a3b5c66bbd6d87fcf57dee1b6f3dec01f1d6ecb2fce0c722d494f46acb05348deeb91a33633c397787cc5bc364f579f01b756159b83428fd073a353e4d7321351378738f2b9007902c71309da4beddf5ea94775d47", 0x69}, {&(0x7f0000002480)="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", 0x1000}, {&(0x7f0000003480)="fdd8b3ed20114a3c399b39a3c332bc8d887ef1632f5ddd3af1ce3c9657fd9601f36d68794f6f273805937263f56425afcbaa080bcc33a72756615e1cc71666606ee23710", 0x44}, {&(0x7f0000003500)="a7b1b4d7cac511", 0x7}, {&(0x7f0000003540)="93eedd07070f74c3c014a4369c8827c490c525b6beaab2d65b62e57348281d32cc1b9b95b2f066b74f4beee77eb9d1042dae51b4c46f2102eb4fd1c3e0ac56cd544f6f7c808b9acd5f4d7d0bd6bc2de3f0f5bcba8afe01c5e5df23e44cd24ea3721248bd967d98d83dc5cc3792d8", 0x6e}], 0x6, &(0x7f0000003640)=[@ip_retopts={{0xb8, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x2c, 0xcb, 0x3, 0x9, [{@loopback, 0xf06e}, {@rand_addr=0x64010101, 0x200}, {@local, 0x522d}, {@multicast1, 0xffff8000}, {@rand_addr=0x64010102, 0x5}]}, @ssrr={0x89, 0xb, 0x1a, [@local, @loopback]}, @lsrr={0x83, 0x1f, 0x73, [@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @broadcast, @remote, @multicast2]}, @end, @timestamp={0x44, 0x14, 0xb9, 0x0, 0x2, [0x7, 0x7, 0x7, 0xff]}, @timestamp_prespec={0x44, 0x3c, 0xaa, 0x3, 0x9, [{@private=0xa010100, 0x80000000}, {@remote, 0x2}, {@remote, 0x3}, {@multicast1, 0xd}, {@remote, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}]}, @end]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2000000}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @empty, @dev={0xac, 0x14, 0x14, 0x2d}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @rand_addr=0x64010101, @private=0xa010100}}}], 0x140}, 0x4040005) write$cgroup_devices(r13, &(0x7f00000037c0)={'b', ' *:* ', 'rm\x00'}, 0x9) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003800)) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000003840)=r6, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000038c0)={&(0x7f0000003880)='mlxsw_sp_acl_tcam_vregion_migrate\x00', r12, 0x0, 0x2}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000049c0)={r13, &(0x7f0000003900)="be98d5b86f08096d780211375faf0250d728982337eec589fdb1dd346d82169ea859cbe69fdb43c418c9ab2ae8fc1b6f2391c9e09eb1b6e648e51f3eb1cda9448d284b9b23b3c1b34a1d8420abf18f8c5be393441d7d2a55344578e7e7768a9dd706edbf956ec4be934a3b857b0317e758a5cb009f3424129f8be004e09ac326d45f8fedfb86e050622bcb750bd1e59aa3f4de68e784e77a6df5e7d04a18790b7e62cfa67082f397f2e9af41aa0e663dd88cad992914405b65f8796a790c85", &(0x7f00000039c0)=""/4096}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004a00)=@bloom_filter={0x1e, 0x6, 0x63, 0x9, 0x400d2, r2, 0xfffffffd, '\x00', r0, r15, 0x0, 0x5, 0x2, 0xe, @void, @value, @void, @value}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000004a00)=@bloom_filter={0x1e, 0x6, 0x63, 0x9, 0x400d2, r2, 0xfffffffd, '\x00', r0, r15, 0x0, 0x5, 0x2, 0xe, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000004a80)=@bloom_filter={0x1e, 0x46e, 0x8, 0xfff, 0x48888, r16, 0x6, '\x00', r0, r8, 0x4, 0x0, 0x5, 0x9, @value=r17, @void, @void, @value}, 0x50) 21.058397296s ago: executing program 0 (id=1137): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0xa, &(0x7f0000000900)=ANY=[@ANYBLOB="4e270000ff7f000018450000ffffffff00000000000000342700358b0000100000008520000002000000851000f1fcffffff184700000600000000000000000000000d3d08000500000085110000e6000000"], &(0x7f0000000380)='GPL\x00', 0x2, 0xc8, &(0x7f00000004c0)=""/200, 0x100, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x6, 0x6, 0xe}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000740)=[r0, r0, r2, r0, r0, r0, r0], &(0x7f0000000780)=[{0x5, 0x1, 0x5}, {0x2, 0x1, 0xb, 0x1}, {0x4, 0x2, 0x4, 0x6}], 0x10, 0x401, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2a}, @ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x9, 0x5, 0x20009, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r9}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) 21.003709636s ago: executing program 2 (id=1139): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r3}, 0x10) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r5}, 0x10) close(r4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340)={0xffffffff}, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10a21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x67fa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000), 0x15) 20.915155737s ago: executing program 2 (id=1140): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791210000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x0, 0x4}, {0x25, 0x1}, {0xb1, 0x0, 0x0, 0x1ff}, {0x6}]}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_subtree(r6, &(0x7f0000000000), 0x15) 20.895198267s ago: executing program 2 (id=1143): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x14}, 0x0, 0xc8, 0xffffffff, 0x3, 0x34}, 0x0, 0x7, 0xffffffffffffffff, 0x9) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)=""/230, 0xe6}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001400)=ANY=[@ANYRES16=r7, @ANYRESOCT=r9, @ANYRESHEX=r1, @ANYRES32=r8, @ANYBLOB="824d11133f08a28bd9908eb01fb13d3f7bdb6704ec6f20c224078d945cddf399c69e48d16aa7d7f8c021ec96a0da87eafaa3ad49386917994a5c15b340bbf94082c4d88e7fa0a66bb84409d6dffe573138c99163c2d0afba76a911d273dad59a6bc9db10e1b3dd5383b4837f04f47300cbc55bf80de33288736cb176a2bab922bf401c5977c7eeb99ea2db19ed3cf3a315150e3fb5d8e60966025e2a9edcd5c084462767bc180c8133284bc5bd0fbe00b41503df0fb298ed6231fca514db895022a625c32543a805314a7ac96b4828c3f2d0810a631c70a71f0ec3c6", @ANYRES16=r0, @ANYRES64=0x0, @ANYRES8=r8], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001180)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$SIOCSIFHWADDR(r11, 0x8946, &(0x7f0000000900)={'veth0_macvtap\x00', @random='\x00\x00\x00 \x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 20.551238339s ago: executing program 1 (id=1151): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfdef) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x3fc00001, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000), 0x15) 20.25948793s ago: executing program 0 (id=1159): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/172, 0xac}], 0x1, &(0x7f0000000140)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xa8}, 0x0) ioctl$TUNDETACHFILTER(r7, 0x401054d6, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) syz_clone(0x10000000, &(0x7f0000000300)="78ad74fb86d4d3ab2952b52505f8c623664553edb9f6e8361fed9dd6054abc753ed59e0bd07dd408b41a6e78afb9989c746795dfa077348b2e2eaf0acc0be183f12f5372c218dc4946cd1c704d09ac46632483c4ba58905396c187916f85cfd9ded991dc8e3a1b4427fc0afc72688dc547b0cae7cbdc5561ab56eee5eabf87bbf73b6e4302e52c872683", 0x8a, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="9703f4ba177da3e09d9616b52b27477c2f8a75e1682d039b83689f0f735d0c8932467e0cfcd40904") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000480)='rxrpc_propose_ack\x00', r4, 0x0, 0x9}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r11, r8, 0x0, 0x2, &(0x7f0000000500)='#\x00'}, 0x30) r13 = syz_clone(0x10000080, &(0x7f0000000580), 0x0, &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)="e590bca850be363be41d9b58c0ac9b7816b229b4af18330aef22d05e7b54fc7fdf622ac7a98f95848f22c4a63e3a3b955cfc09e2507b41c55d87860e70cb1449cac8166d0590814c284e11ad81446815e656aea2a30eb9252463c2ca7ca6221185d1235fb8664abedf45368c00814bc461472cbf2c207cbbb22f38a031d200ce7dd30c587d3a1ff0c6af98b6374c574d491a7e0625cd566a93ea") r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='qdisc_create\x00', r8, 0x0, 0x8}, 0x18) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x3, '\x00', r12, r4, 0x5, 0x2, 0x4, 0x0, @void, @value, @void, @value}, 0x50) socketpair(0x8, 0x4, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a00)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x6, '\x00', 0x0, r5, 0x1, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x4, &(0x7f0000000840)=@raw=[@map_fd={0x18, 0x6, 0x1, 0x0, r15}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x45}], &(0x7f0000000880)='syzkaller\x00', 0xffff7fff, 0xb6, &(0x7f00000008c0)=""/182, 0x41000, 0x60, '\x00', r12, @fallback=0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0xc, 0x800, 0x80000001}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000a80)=[r17, r14, r2, r15, r5], 0x0, 0x10, 0x9, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b80)='./cgroup.net/syz0\x00', 0x1ff) r18 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x2, 0xfffffdcc, 0x2, 0xc3d, 0x800, r8, 0xe23, '\x00', 0x0, r6, 0x2, 0x3, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r7, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r20 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0xa, 0xe88, 0x1, 0x7ff, 0x0, r6, 0xf, '\x00', r19, 0xffffffffffffffff, 0x4, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f00)={r18, 0x58, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r22 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001000)={0x6, 0x0, &(0x7f0000000d80), &(0x7f0000000dc0)='syzkaller\x00', 0xa2, 0x44, &(0x7f0000000e00)=""/68, 0x40f00, 0x10, '\x00', r21, 0x25, r3, 0x8, &(0x7f0000000f40)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000f80)={0x1, 0x0, 0xc17, 0x10001}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000fc0)=[{0x0, 0x3, 0xc, 0x6}, {0x0, 0x5, 0x2, 0x2}], 0x10, 0x24, @void, @value}, 0x94) r23 = openat$cgroup_ro(r0, &(0x7f00000010c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={&(0x7f0000001100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@type_tag={0x10, 0x0, 0x0, 0x12, 0x1}, @decl_tag={0x9, 0x0, 0x0, 0x11, 0x3, 0x6}, @float={0x2, 0x0, 0x0, 0x10, 0x10}]}, {0x0, [0x2e, 0x30]}}, &(0x7f0000001180)=""/78, 0x44, 0x4e, 0x0, 0x5, 0x0, @void, @value}, 0x28) write$cgroup_pid(r2, &(0x7f0000001240)=r10, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={r4, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001400)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000014c0)=[0x0, 0x0], 0x0, 0xd8, &(0x7f0000001500)=[{}, {}], 0x10, 0x10, &(0x7f0000001540), &(0x7f0000001580), 0x8, 0x8f, 0x8, 0x8, &(0x7f00000015c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000017c0)={0x6, 0xb, &(0x7f0000001280)=@raw=[@exit, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @ldst={0x3, 0x0, 0x0, 0x3, 0x3, 0x30, 0xfffffffffffffff0}, @alu={0x4, 0x0, 0x0, 0x3, 0x4, 0x1, 0x1}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x46}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], &(0x7f0000001300)='syzkaller\x00', 0x2, 0x91, &(0x7f0000001340)=""/145, 0x40f00, 0x10, '\x00', r24, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001740)=[r23, r2], &(0x7f0000001780)=[{0x5, 0x1, 0xa, 0xa}], 0x10, 0x1, @void, @value}, 0x94) perf_event_open(&(0x7f0000001880)={0x0, 0x80, 0xaf, 0x9, 0x6c, 0x40, 0x0, 0x1ff, 0x84200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x5, 0x77c}, 0x100, 0x3, 0x80000001, 0x5, 0x3, 0xfffffffd, 0x8e3, 0x0, 0x6, 0x0, 0x38a}, r13, 0xe, r9, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000001900), 0x800000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001980)={&(0x7f0000001940)='xprtrdma_frwr_dereg\x00', r5, 0x0, 0x8000}, 0x18) r26 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001cc0)={&(0x7f0000001b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x113, 0x113, 0x3, [@int={0xe, 0x0, 0x0, 0x1, 0x0, 0x64, 0x0, 0x19}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xd}, {0x1, 0x2}, {0x1}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x4, 0x3}, {0x9, 0x2}, {0xe, 0x2}, {0x0, 0x4}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1, 0x7}}, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @datasec={0x6, 0x2, 0x0, 0xf, 0x3, [{0x1, 0xffff, 0x5}, {0x4, 0x6, 0x7}], "ccd7cc"}, @typedef={0x10, 0x0, 0x0, 0x8, 0x2}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0xb, 0x4}, {0x7, 0x3}, {0x0, 0x2}, {0x10, 0x5}, {0xc, 0x4}, {0x10, 0x1}, {0x3, 0x4}, {0x4, 0x1}, {0x3, 0x2}, {0xd, 0x4}]}]}, {0x0, [0x30]}}, &(0x7f0000001c40)=""/99, 0x12f, 0x63, 0x0, 0x40, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000001d80)={0xa, 0x1e, &(0x7f00000019c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r18}}, {}, [@alu={0x7, 0x0, 0x1, 0x1, 0x26875b2e5e22849d, 0xfffffffffffffff8, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x5, 0x3f70340a944d5759, 0x0, 0xfffffffffffffff0, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x81abf2a13d45627c}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001ac0)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x50, '\x00', r21, @fallback=0x37, r26, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d00)={0x2, 0x3, 0x1, 0x100}, 0x10, r25, r22, 0x0, &(0x7f0000001d40)=[r20, r18], 0x0, 0x10, 0x3, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r16, 0x1, 0x32, &(0x7f0000001e40)=r6, 0x4) 19.947566401s ago: executing program 2 (id=1169): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0xa, &(0x7f0000000900)=ANY=[@ANYBLOB="4e270000ff7f000018450000ffffffff00000000000000342700358b0000100000008520000002000000851000f1fcffffff184700000600000000000000000000000d3d08000500000085110000e6000000"], &(0x7f0000000380)='GPL\x00', 0x2, 0xc8, &(0x7f00000004c0)=""/200, 0x100, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x6, 0x6, 0xe}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000740)=[r0, r0, r2, r0, r0, r0, r0], &(0x7f0000000780)=[{0x5, 0x1, 0x5}, {0x2, 0x1, 0xb, 0x1}, {0x4, 0x2, 0x4, 0x6}], 0x10, 0x401, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2a}, @ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x9, 0x5, 0x20009, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r9}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) 19.667321553s ago: executing program 1 (id=1183): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000001d00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0a00000016000000b40000007f00000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 `\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x21) 19.666237412s ago: executing program 4 (id=1184): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 19.665776103s ago: executing program 1 (id=1185): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00"/12, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000001000008500000095000000b7000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xf7, &(0x7f0000001e40)=""/4093, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x26) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) socketpair(0x1f, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/15], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000048000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000a40)=ANY=[@ANYRESOCT, @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095", @ANYBLOB="18ddcb9ad223607b816e747d81220793f9fb420d7d35bdd325e4ddbd9d3a31b57522303b88a8052415f3e659fa2347c0241a6bf460deb756267afb05fef749182c5944670776ac4f613f12e1bef96e025a09a40803c9d26eaa5c1626d9935efdfabcd3c7aa1aef69c256cdad4063949c80c074fc6b3c59c75618ad", @ANYRESOCT=r4, @ANYBLOB="1c6faf5d20de2878197eb96a2e747b864ea8072c4387b5e24536be57750b227271d8fd36d6208bb4cfa3e35ec71009e2f599fb722e46eaea04f3de578d6e1a4de91fb54b82a46c4d9e18f21bc426480754"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000001080)}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000001240)='ifs_status\x00'}, 0x10) 19.599903003s ago: executing program 4 (id=1186): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000001c42", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000300)='tasks\x00', 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r5, &(0x7f0000000840), 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b708000000002d007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r7}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000400)={'syz_tun\x00', 0x400}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000440)={'veth1\x00', 0x600}) openat$cgroup_int(r5, &(0x7f0000000340)='memory.oom.group\x00', 0x2, 0x0) r10 = openat$cgroup_freezer_state(r5, &(0x7f0000002b00), 0x2, 0x0) close(r10) ioctl$TUNSETOFFLOAD(r0, 0x8004745a, 0x2000000c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f0000000040)='./cgroup/../file0\x00', 0x0, 0x18, r3}, 0x18) 19.596755573s ago: executing program 1 (id=1187): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0a00000016000000b40000007f00000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 `\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xa6, 0x9, 0x1ff, 0x4000, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x8, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0xe, &(0x7f0000000500)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @call={0x85, 0x0, 0x0, 0x55}], &(0x7f0000000200)='GPL\x00', 0xcfe, 0xc6, &(0x7f0000000700)=""/198, 0x41000, 0x1, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x2, 0xe, 0x9, 0x5cb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[r1, r3, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x49, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x43, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000080), 0x12) write$cgroup_int(r6, &(0x7f0000000100)=0x1, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000600000b00000002000093070000001000000004000000000000000100000084000000c8a2000000be5f616100db1764d350ff26836c3e9db3fd3a02d85f034a1673edbc168aafb69acc87e1c82a26b847763e40687fa11457ef0f769140f4cd6e7c8d1a7af67da9168a7e5b67ff"], &(0x7f0000000580)=""/180, 0x42, 0xb4, 0x0, 0x6, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x21) 19.564801493s ago: executing program 4 (id=1188): socketpair(0x25, 0x3, 0x4, &(0x7f0000000000)={0xffffffffffffffff}) (async, rerun: 32) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) (rerun: 32) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x101000, 0x0) (async, rerun: 32) r2 = getpid() (rerun: 32) r3 = syz_open_procfs$namespace(r2, &(0x7f0000000100)='ns/net\x00') (async, rerun: 32) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1b9806, 0x0) (rerun: 32) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x1ff) (async) getpid() (async) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000300)={0x40, 0x0}, 0x8) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xd, 0x9, 0xa, 0x0, 0x8000, 0x1, 0xfffff6de, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0x0, @value, @void, @void, @value}, 0x50) (async, rerun: 32) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r3, 0xffffffffffffffff}, 0x4) (rerun: 32) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x2, 0x0, @void, @value, @void, @value}, 0x50) (async, rerun: 32) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000480)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xfffffffa, '\x00', 0x0, r1, 0x5, 0x5, 0x5, 0x0, @void, @value, @void, @value}, 0x50) (rerun: 32) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x6, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x800}, [@cb_func={0x18, 0x4, 0x4, 0x0, 0x2}, @jmp={0x5, 0x0, 0x8, 0x4, 0x2, 0x20, 0x10}]}, &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x58, '\x00', 0x0, @fallback=0x2a, r5, 0x8, &(0x7f0000000280)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0xe, 0xcca}, 0x10, r6, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, r7, r8, 0xffffffffffffffff, r9, r10], 0x0, 0x10, 0xb, @void, @value}, 0x94) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r7, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x13, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xfffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', r12, 0x25, r11, 0x8, &(0x7f00000007c0)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[r9, r10, 0xffffffffffffffff, r9, r8, r10], 0x0, 0x10, 0x1, @void, @value}, 0x94) (async, rerun: 32) r13 = gettid() (rerun: 32) r14 = perf_event_open(&(0x7f0000000940)={0x0, 0x80, 0xfa, 0x2, 0xff, 0x36, 0x0, 0xf6d8, 0x40, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000900), 0xc}, 0x4140, 0x7, 0x5, 0x3, 0xc, 0x2, 0x800, 0x0, 0x3, 0x0, 0x1}, r13, 0x9, 0xffffffffffffffff, 0x0) (async) r15 = openat$tun(0xffffffffffffff9c, &(0x7f00000009c0), 0x800, 0x0) ioctl$TUNSETVNETBE(r15, 0x400454de, &(0x7f0000000a00)) (async, rerun: 32) r16 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000a40)='syz1\x00', 0x200002, 0x0) (rerun: 32) r17 = openat$cgroup_ro(r16, &(0x7f0000000a80)='blkio.bfq.io_merged\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f40)={r17, 0xe0, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000c80)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, &(0x7f0000000cc0)=[0x0, 0x0, 0x0], &(0x7f0000000d00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x90, &(0x7f0000000d40)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000d80), &(0x7f0000000dc0), 0x8, 0xb9, 0x8, 0x8, &(0x7f0000000e00)}}, 0x10) (async, rerun: 32) r19 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', r12, r17, 0x1, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x11, 0x21, &(0x7f0000000ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffff}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}, @map_fd={0x18, 0x9, 0x1, 0x0, r9}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x5}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x182b}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000c00)='syzkaller\x00', 0x3, 0x30, &(0x7f0000000c40)=""/48, 0x41100, 0x4, '\x00', r18, 0x0, r17, 0x8, &(0x7f0000000f80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000fc0)={0x5, 0xd, 0x3, 0x4}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000001080)=[r10, r7, r19, r8, r10, r9], &(0x7f00000010c0)=[{0x5, 0x3, 0x9, 0x1}, {0xffffffff, 0x2, 0x8, 0x4}, {0x0, 0x3, 0x2, 0xb}, {0x0, 0x5, 0x1, 0xc}, {0x3, 0x2, 0xe}, {0x2, 0x4, 0x8, 0x3}, {0x4, 0x3, 0xe, 0x9}, {0x4, 0x5, 0x10, 0xa}, {0x2, 0x1, 0x8, 0x5}], 0x10, 0x8, @void, @value}, 0x94) (async) r20 = perf_event_open(&(0x7f0000001280)={0x7, 0x80, 0xa, 0x6, 0x4, 0x7, 0x0, 0x7, 0xc0002, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffc00, 0x2, @perf_bp={&(0x7f0000001240), 0xd}, 0x2000, 0x1, 0xfd5, 0x9, 0x7, 0xfffff647, 0x400, 0x0, 0x100, 0x0, 0x54}, 0xffffffffffffffff, 0xc, r14, 0x3) close(r20) 19.495226393s ago: executing program 4 (id=1189): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000340)='syz1\x00', 0x1ff) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x21) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = getpid() sendmsg$unix(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000440)='R', 0x1}], 0x1, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r6}}}], 0x20}, 0x0) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) openat$ppp(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400, 0x0) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRESDEC=r7], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 19.489430953s ago: executing program 4 (id=1190): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000060}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x29, &(0x7f0000000640)=[{}], 0x8, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0xce, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x11, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xed1, 0x0, 0x0, 0x0, 0x200}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_val={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='syzkaller\x00', 0x9, 0x4b, &(0x7f0000000500)=""/75, 0x41000, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x0, 0x5, 0x401, 0x21}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000900)=[r1, r1, r1], &(0x7f0000000940)=[{0x0, 0x5, 0xf, 0x5}, {0x4, 0x1, 0x5, 0x7}, {0x0, 0x2, 0x10, 0x7}, {0x5, 0x5, 0x3, 0x9}, {0x0, 0x3, 0x8, 0x2}, {0x1, 0x4, 0x8}, {0x2, 0x3, 0xd, 0xc}, {0x3, 0x2, 0x7}, {0x5, 0x2, 0xb, 0x6}, {0x1, 0x1, 0x3, 0x5}], 0x10, 0x7, @void, @value}, 0x94) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000ac0)='blkio.bfq.empty_time\x00', 0x0, 0x0) write$cgroup_freezer_state(r7, &(0x7f0000000b00)='FREEZING\x00', 0x9) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_subtree(r8, &(0x7f0000000000), 0x15) 19.488336723s ago: executing program 1 (id=1191): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="000000000000000066000200000000001800000000ffffff80000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 19.487587913s ago: executing program 4 (id=1192): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$MAP_CREATE(0x1d, &(0x7f0000001c40)=ANY=[@ANYBLOB="001800000010000000000000001515070000000000000086"], 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) close(r2) 19.486913714s ago: executing program 1 (id=1193): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x14, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)=r4}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='timer_start\x00', r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x34, 0xc, &(0x7f0000000180)=ANY=[@ANYRESDEC=r2, @ANYRES64=r2, @ANYBLOB="9df30a7bbff7c827f4c41d69909fe1e4bca455bc07c20d03097325d1bd42287769e0926ca21528769b5760eeff14c6d5ea4cf9583e15a8bdccf810ff5294421dd8edf672cd4793b3a4cfb02f69c4860a4fbb1c2249488379ffa6944decf54167b20b9dbd97bca51fbde8eff5b12602461ede78e4ccd12cb141eb2494b1fb79", @ANYRESHEX=r2, @ANYBLOB="eab68833fd58541a7474d41ddb52ee8987a62b0fbdf7d9e4af838987b975a63cdb52971d497e6a1beda2005aa4b6acbbce7134a6eae40b6b982f4d8f5e41451b590541b7b45ee2fe5c863a52bb4b3e33b9be5a73ec141db5631493a255e0c63945e273df3289eee21897141957c7e82b021f807f3ccd52a7ef8b16f346a6f16e1e6ddcb5fc8346e880b1ebff06ea471b60c2b3bdf6f6658307b5ae297aa5193dde2606c5716832c71aac297cec177b49bf2eb4e574d02a7a1763fc33e2920bcb671138a519962662b56e340c4f857b6a095f980a90d761"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.556349009s ago: executing program 32 (id=1159): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/172, 0xac}], 0x1, &(0x7f0000000140)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xa8}, 0x0) ioctl$TUNDETACHFILTER(r7, 0x401054d6, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) syz_clone(0x10000000, &(0x7f0000000300)="78ad74fb86d4d3ab2952b52505f8c623664553edb9f6e8361fed9dd6054abc753ed59e0bd07dd408b41a6e78afb9989c746795dfa077348b2e2eaf0acc0be183f12f5372c218dc4946cd1c704d09ac46632483c4ba58905396c187916f85cfd9ded991dc8e3a1b4427fc0afc72688dc547b0cae7cbdc5561ab56eee5eabf87bbf73b6e4302e52c872683", 0x8a, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="9703f4ba177da3e09d9616b52b27477c2f8a75e1682d039b83689f0f735d0c8932467e0cfcd40904") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000480)='rxrpc_propose_ack\x00', r4, 0x0, 0x9}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r11, r8, 0x0, 0x2, &(0x7f0000000500)='#\x00'}, 0x30) r13 = syz_clone(0x10000080, &(0x7f0000000580), 0x0, &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)="e590bca850be363be41d9b58c0ac9b7816b229b4af18330aef22d05e7b54fc7fdf622ac7a98f95848f22c4a63e3a3b955cfc09e2507b41c55d87860e70cb1449cac8166d0590814c284e11ad81446815e656aea2a30eb9252463c2ca7ca6221185d1235fb8664abedf45368c00814bc461472cbf2c207cbbb22f38a031d200ce7dd30c587d3a1ff0c6af98b6374c574d491a7e0625cd566a93ea") r14 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='qdisc_create\x00', r8, 0x0, 0x8}, 0x18) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x3, '\x00', r12, r4, 0x5, 0x2, 0x4, 0x0, @void, @value, @void, @value}, 0x50) socketpair(0x8, 0x4, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a00)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x6, '\x00', 0x0, r5, 0x1, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x4, &(0x7f0000000840)=@raw=[@map_fd={0x18, 0x6, 0x1, 0x0, r15}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x45}], &(0x7f0000000880)='syzkaller\x00', 0xffff7fff, 0xb6, &(0x7f00000008c0)=""/182, 0x41000, 0x60, '\x00', r12, @fallback=0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0xc, 0x800, 0x80000001}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000a80)=[r17, r14, r2, r15, r5], 0x0, 0x10, 0x9, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b80)='./cgroup.net/syz0\x00', 0x1ff) r18 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x2, 0xfffffdcc, 0x2, 0xc3d, 0x800, r8, 0xe23, '\x00', 0x0, r6, 0x2, 0x3, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r7, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r20 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0xa, 0xe88, 0x1, 0x7ff, 0x0, r6, 0xf, '\x00', r19, 0xffffffffffffffff, 0x4, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f00)={r18, 0x58, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r22 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001000)={0x6, 0x0, &(0x7f0000000d80), &(0x7f0000000dc0)='syzkaller\x00', 0xa2, 0x44, &(0x7f0000000e00)=""/68, 0x40f00, 0x10, '\x00', r21, 0x25, r3, 0x8, &(0x7f0000000f40)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000f80)={0x1, 0x0, 0xc17, 0x10001}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000fc0)=[{0x0, 0x3, 0xc, 0x6}, {0x0, 0x5, 0x2, 0x2}], 0x10, 0x24, @void, @value}, 0x94) r23 = openat$cgroup_ro(r0, &(0x7f00000010c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={&(0x7f0000001100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@type_tag={0x10, 0x0, 0x0, 0x12, 0x1}, @decl_tag={0x9, 0x0, 0x0, 0x11, 0x3, 0x6}, @float={0x2, 0x0, 0x0, 0x10, 0x10}]}, {0x0, [0x2e, 0x30]}}, &(0x7f0000001180)=""/78, 0x44, 0x4e, 0x0, 0x5, 0x0, @void, @value}, 0x28) write$cgroup_pid(r2, &(0x7f0000001240)=r10, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={r4, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001400)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000014c0)=[0x0, 0x0], 0x0, 0xd8, &(0x7f0000001500)=[{}, {}], 0x10, 0x10, &(0x7f0000001540), &(0x7f0000001580), 0x8, 0x8f, 0x8, 0x8, &(0x7f00000015c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000017c0)={0x6, 0xb, &(0x7f0000001280)=@raw=[@exit, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @ldst={0x3, 0x0, 0x0, 0x3, 0x3, 0x30, 0xfffffffffffffff0}, @alu={0x4, 0x0, 0x0, 0x3, 0x4, 0x1, 0x1}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x46}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], &(0x7f0000001300)='syzkaller\x00', 0x2, 0x91, &(0x7f0000001340)=""/145, 0x40f00, 0x10, '\x00', r24, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001740)=[r23, r2], &(0x7f0000001780)=[{0x5, 0x1, 0xa, 0xa}], 0x10, 0x1, @void, @value}, 0x94) perf_event_open(&(0x7f0000001880)={0x0, 0x80, 0xaf, 0x9, 0x6c, 0x40, 0x0, 0x1ff, 0x84200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x5, 0x77c}, 0x100, 0x3, 0x80000001, 0x5, 0x3, 0xfffffffd, 0x8e3, 0x0, 0x6, 0x0, 0x38a}, r13, 0xe, r9, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000001900), 0x800000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001980)={&(0x7f0000001940)='xprtrdma_frwr_dereg\x00', r5, 0x0, 0x8000}, 0x18) r26 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001cc0)={&(0x7f0000001b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x113, 0x113, 0x3, [@int={0xe, 0x0, 0x0, 0x1, 0x0, 0x64, 0x0, 0x19}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xd}, {0x1, 0x2}, {0x1}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x4, 0x3}, {0x9, 0x2}, {0xe, 0x2}, {0x0, 0x4}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1, 0x7}}, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @datasec={0x6, 0x2, 0x0, 0xf, 0x3, [{0x1, 0xffff, 0x5}, {0x4, 0x6, 0x7}], "ccd7cc"}, @typedef={0x10, 0x0, 0x0, 0x8, 0x2}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0xb, 0x4}, {0x7, 0x3}, {0x0, 0x2}, {0x10, 0x5}, {0xc, 0x4}, {0x10, 0x1}, {0x3, 0x4}, {0x4, 0x1}, {0x3, 0x2}, {0xd, 0x4}]}]}, {0x0, [0x30]}}, &(0x7f0000001c40)=""/99, 0x12f, 0x63, 0x0, 0x40, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000001d80)={0xa, 0x1e, &(0x7f00000019c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r18}}, {}, [@alu={0x7, 0x0, 0x1, 0x1, 0x26875b2e5e22849d, 0xfffffffffffffff8, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x5, 0x3f70340a944d5759, 0x0, 0xfffffffffffffff0, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x81abf2a13d45627c}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001ac0)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x50, '\x00', r21, @fallback=0x37, r26, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d00)={0x2, 0x3, 0x1, 0x100}, 0x10, r25, r22, 0x0, &(0x7f0000001d40)=[r20, r18], 0x0, 0x10, 0x3, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r16, 0x1, 0x32, &(0x7f0000001e40)=r6, 0x4) 2.539836359s ago: executing program 33 (id=1193): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x14, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)=r4}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='timer_start\x00', r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x34, 0xc, &(0x7f0000000180)=ANY=[@ANYRESDEC=r2, @ANYRES64=r2, @ANYBLOB="9df30a7bbff7c827f4c41d69909fe1e4bca455bc07c20d03097325d1bd42287769e0926ca21528769b5760eeff14c6d5ea4cf9583e15a8bdccf810ff5294421dd8edf672cd4793b3a4cfb02f69c4860a4fbb1c2249488379ffa6944decf54167b20b9dbd97bca51fbde8eff5b12602461ede78e4ccd12cb141eb2494b1fb79", @ANYRESHEX=r2, @ANYBLOB="eab68833fd58541a7474d41ddb52ee8987a62b0fbdf7d9e4af838987b975a63cdb52971d497e6a1beda2005aa4b6acbbce7134a6eae40b6b982f4d8f5e41451b590541b7b45ee2fe5c863a52bb4b3e33b9be5a73ec141db5631493a255e0c63945e273df3289eee21897141957c7e82b021f807f3ccd52a7ef8b16f346a6f16e1e6ddcb5fc8346e880b1ebff06ea471b60c2b3bdf6f6658307b5ae297aa5193dde2606c5716832c71aac297cec177b49bf2eb4e574d02a7a1763fc33e2920bcb671138a519962662b56e340c4f857b6a095f980a90d761"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.538877599s ago: executing program 34 (id=1169): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0xa, &(0x7f0000000900)=ANY=[@ANYBLOB="4e270000ff7f000018450000ffffffff00000000000000342700358b0000100000008520000002000000851000f1fcffffff184700000600000000000000000000000d3d08000500000085110000e6000000"], &(0x7f0000000380)='GPL\x00', 0x2, 0xc8, &(0x7f00000004c0)=""/200, 0x100, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x6, 0x6, 0xe}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000740)=[r0, r0, r2, r0, r0, r0, r0], &(0x7f0000000780)=[{0x5, 0x1, 0x5}, {0x2, 0x1, 0xb, 0x1}, {0x4, 0x2, 0x4, 0x6}], 0x10, 0x401, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2a}, @ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x9, 0x5, 0x20009, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r9}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) 2.491590108s ago: executing program 35 (id=880): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000380)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000280), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_freezer_state(r1, &(0x7f0000000040)='FROZEN\x00', 0x7) r3 = openat$cgroup_procs(r0, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x6a, 0x6, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000570000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r7}, 0x8) ioctl$SIOCSIFHWADDR(r6, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r8, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 2.490955159s ago: executing program 36 (id=1192): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$MAP_CREATE(0x1d, &(0x7f0000001c40)=ANY=[@ANYBLOB="001800000010000000000000001515070000000000000086"], 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x400}) close(r2) 564.178348ms ago: executing program 5 (id=1194): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001400)={{r5}, &(0x7f0000001380), &(0x7f00000013c0)='%-010d \x00'}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r5, &(0x7f0000000080), 0x0}, 0x20) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000), 0x15) 531.332618ms ago: executing program 5 (id=1199): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x8, 0x42, 0x40, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x11, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xd1e}, {}, {}, [@exit, @alu={0x4, 0x0, 0x6, 0x8, 0x9, 0x100}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xe1, &(0x7f00000006c0)=""/225, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="020000000400eb000800000001000000e7000000", @ANYRES32=0x1, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="050000000400"/28], 0x50) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x1000000, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r0, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="8fffff000000000000000000c4b7c64d6edcdb4c4200750f966f6dc923318134a8725f03711033a8a7f6bf963698c8b354f4d6f7e081fdfce1f703980eee9bc4e96a9981e9ee50bb9f91", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(r4, 0x0, 0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071120900000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='block_rq_requeue\x00', r5}, 0x18) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x1, 0x1, 0x8, 0x0, 0x0, 0xc56, 0x2a248, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f4, 0x0, @perf_config_ext={0x3, 0xfffffffffffffff7}, 0x100080, 0x1, 0x81, 0x0, 0x3, 0x6, 0x19, 0x0, 0x800, 0x0, 0x800}, 0x0, 0x7, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x4, 0x2, 0x1, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 513.926398ms ago: executing program 7 (id=1196): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00"/12, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000001000008500000095000000b7000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xf7, &(0x7f0000001e40)=""/4093, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x26) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) socketpair(0x1f, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/15], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000a40)=ANY=[@ANYRESOCT, @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095", @ANYBLOB="18ddcb9ad223607b816e747d81220793f9fb420d7d35bdd325e4ddbd9d3a31b57522303b88a8052415f3e659fa2347c0241a6bf460deb756267afb05fef749182c5944670776ac4f613f12e1bef96e025a09a40803c9d26eaa5c1626d9935efdfabcd3c7aa1aef69c256cdad4063949c80c074fc6b3c59c75618ad", @ANYRESOCT=r4, @ANYBLOB="1c6faf5d20de2878197eb96a2e747b864ea8072c4387b5e24536be57750b227271d8fd36d6208bb4cfa3e35ec71009e2f599fb722e46eaea04f3de578d6e1a4de91fb54b82a46c4d9e18f21bc426480754"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000001080)}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000001240)='ifs_status\x00'}, 0x10) 456.025208ms ago: executing program 8 (id=1197): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00"/12, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000001000008500000095000000b7000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xf7, &(0x7f0000001e40)=""/4093, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x26) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) socketpair(0x1f, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/15], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000048000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000a40)=ANY=[@ANYRESOCT, @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095", @ANYBLOB="18ddcb9ad223607b816e747d81220793f9fb420d7d35bdd325e4ddbd9d3a31b57522303b88a8052415f3e659fa2347c0241a6bf460deb756267afb05fef749182c5944670776ac4f613f12e1bef96e025a09a40803c9d26eaa5c1626d9935efdfabcd3c7aa1aef69c256cdad4063949c80c074fc6b3c59c75618ad", @ANYRESOCT=r4, @ANYBLOB="1c6faf5d20de2878197eb96a2e747b864ea8072c4387b5e24536be57750b227271d8fd36d6208bb4cfa3e35ec71009e2f599fb722e46eaea04f3de578d6e1a4de91fb54b82a46c4d9e18f21bc426480754"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000001080)}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000001240)='ifs_status\x00'}, 0x10) 280.674609ms ago: executing program 7 (id=1200): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300), 0x20, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffc}, [@call={0x85, 0x0, 0x0, 0x9e}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYRESOCT=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x108400, &(0x7f0000000040)="9feee4f10ed31f4612f819a0c832efb25af75154c93e3499fc4b3e7421f8575b3c0ea3cbb2a3a7148988f077786cba200e60f6b76974da2601af76bc8b63", 0x3e, &(0x7f0000000180), 0x0, &(0x7f0000000340)="089a5ee76e15de6688556a0f98544f7670ee2871800f538fb457e878b7b7d2026b69bacc32c9f1a87871decbf9c82bd6877d9830caa9f8dd17b84aa3ec28376c3a87a589df04d196d7bccd394f63c230aafc11c21ee3") r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000d879"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x40047451, 0x2000000a) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x30, 0x0, 0x0, 0xfffff014}, {0x6}]}) ioctl$TUNSETDEBUG(r7, 0x400454c9, &(0x7f00000001c0)=0x80) 264.629639ms ago: executing program 8 (id=1201): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fib_table_lookup\x00', r0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0500000004000000040000000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="18000905000000000000000000003d0a1588000007e8e6fd55b357a4aadcaea3544302fb69536428e0d4c5c96f4a14504ad205ef38554ae2c357b35ce4559bfc908f197fe193ead65ef5e0dfeab6b6e4cc43bf7c706c0284b19f93edc0fa5a9b132feb8e6947d081366c2687ceeb0123492832194db389bffa2cf283d846bbd73073bf449a64ceedc0155f9cfdaec573b3767db1cf99c6059143090ba4391668fd3164", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 190.997499ms ago: executing program 9 (id=1198): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000013bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 178.951449ms ago: executing program 6 (id=1195): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000044700000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r2}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x0, &(0x7f0000000300)="0000ffffffffa000f2710063d2ac", 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, 0x0, &(0x7f0000000a00)=""/216}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000044700000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r2}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x0, &(0x7f0000000300)="0000ffffffffa000f2710063d2ac", 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) (async) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, 0x0, &(0x7f0000000a00)=""/216}, 0x20) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) (async) 119.641369ms ago: executing program 7 (id=1202): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0a00000016000000b40000007f00000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 `\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xa6, 0x9, 0x1ff, 0x4000, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x8, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0xe, &(0x7f0000000500)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @call={0x85, 0x0, 0x0, 0x55}], &(0x7f0000000200)='GPL\x00', 0xcfe, 0xc6, &(0x7f0000000700)=""/198, 0x41000, 0x1, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000940)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x2, 0xe, 0x9, 0x5cb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[r1, r3, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x49, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x43, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000080), 0x12) write$cgroup_int(r6, &(0x7f0000000100)=0x1, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000600000b00000002000093070000001000000004000000000000000100000084000000c8a2000000be5f616100db1764d350ff26836c3e9db3fd3a02d85f034a1673edbc168aafb69acc87e1c82a26b847763e40687fa11457ef0f769140f4cd6e7c8d1a7af67da9168a7e5b67ff"], &(0x7f0000000580)=""/180, 0x42, 0xb4, 0x0, 0x6, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x21) 119.131919ms ago: executing program 5 (id=1203): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x18) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000040), &(0x7f0000000080)='%ps \x00'}, 0x20) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 106.29829ms ago: executing program 9 (id=1204): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0xfff, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') 74.694659ms ago: executing program 8 (id=1205): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0, 0x0, 0x6}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f0000000380), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004004000e27f00000900000008100000", @ANYRES32, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="7657c1d5020000000000000000000000000000000000000000050000"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000380), 0x5, r2}, 0x38) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="e1e900"/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="0a0010000400000600000000000000020000000000000000a3c95c47"], 0x50) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r5, &(0x7f0000000140), 0x2, 0x0) r6 = openat$cgroup_procs(r5, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1600000000adca4152ae030100ff00000000000000000000000000000000342f3ed00b5be66d3ceb1c9b9544b250da1ee1770217719a5dff482bc371a2b252300068b470dd40e553e199af01528ad6e0f345488fa2530cf61432449caee0b786e5d92513454bff66c3f21c0670b176265884e80c879d90d9fe10592a8c", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, &(0x7f0000000200), &(0x7f0000000380)}, 0x20) socketpair(0x10, 0x3, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000800)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffffe, 0x0, @perf_config_ext, 0x105c34, 0x0, 0x0, 0x0, 0x9, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) 0s ago: executing program 9 (id=1206): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000006000000000000003a01e2c10400000005000800000000000000002e6100"], &(0x7f0000000380)=""/187, 0x32, 0xbb, 0x1, 0x0, 0x0, @void, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b000000ff000000020000002ae6dc381fcf3c4c7acc77714efac4aa5316ce3ad4d68f620dc88cbd9aa209ebbf87196e125010ae79bdf2a12f7b10eeeb146c3fb531d57e88250ec297cb5394f168cf761d0f4c309e9ecef34e9a2cba168fda182ee6120f408b6c85c1f12f55a901a5e0284c1d504fc933710eb34877f50c2451e8ad4042898682f60fc17f7c3bc274ce6476c560aef4cb83dc3a84c5090ec707bbf2", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="feffffffffffffff00"/28], 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYRESOCT=r5, @ANYRES8, @ANYRESDEC=r2, @ANYRESHEX=r0, @ANYRESHEX, @ANYRES64=r4, @ANYRES16=r3, @ANYBLOB="7b8fb81e119beb0fdf6b8c60ba0770774d097a5e9278b07872c4c947e98241cf6d62d6eb98ef6397ae258206dccb3bd81dc57646e080b93272cda66c0ba3125e1ee3b34970908d856249f0b07402db8a1543fe281bd325c1194b47749c8ffdeb7ca7dacdbef69aa3f518e4b5a682c0a0492b9f4c4f93c285d4f1a429af569fb959fc0b1842a2ee284d7d4c94", @ANYRESDEC=r0], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000100)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r7, 0x200fffe, 0xe40, 0x60ff, &(0x7f00000001c0)="5cdd3086ddffff6633c9bbac88a8860040dffd00139fb7a884bdfc14f48786dd", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_procs(r4, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000880), 0x12) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r10, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x58, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x126b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffd, 0x4}, 0x10, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1e) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.56' (ED25519) to the list of known hosts. [ 21.147991][ T24] audit: type=1400 audit(1731461327.730:66): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.148884][ T275] cgroup: Unknown subsys name 'net' [ 21.171046][ T24] audit: type=1400 audit(1731461327.730:67): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.200652][ T24] audit: type=1400 audit(1731461327.760:68): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.200852][ T275] cgroup: Unknown subsys name 'devices' [ 21.370271][ T275] cgroup: Unknown subsys name 'hugetlb' [ 21.375788][ T275] cgroup: Unknown subsys name 'rlimit' [ 21.486886][ T24] audit: type=1400 audit(1731461328.070:69): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.502938][ T278] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.526056][ T24] audit: type=1400 audit(1731461328.070:70): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.552946][ T24] audit: type=1400 audit(1731461328.070:71): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.580630][ T24] audit: type=1400 audit(1731461328.110:72): avc: denied { relabelto } for pid=278 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.608124][ T24] audit: type=1400 audit(1731461328.110:73): avc: denied { write } for pid=278 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.608407][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.635738][ T24] audit: type=1400 audit(1731461328.170:74): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.671468][ T24] audit: type=1400 audit(1731461328.170:75): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.386670][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.394160][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.401778][ T284] device bridge_slave_0 entered promiscuous mode [ 22.409717][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.416744][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.424177][ T284] device bridge_slave_1 entered promiscuous mode [ 22.483680][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.490687][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.497842][ T286] device bridge_slave_0 entered promiscuous mode [ 22.505840][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.512987][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.520454][ T286] device bridge_slave_1 entered promiscuous mode [ 22.556239][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.563596][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.571202][ T287] device bridge_slave_0 entered promiscuous mode [ 22.579223][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.586082][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.593564][ T287] device bridge_slave_1 entered promiscuous mode [ 22.647515][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.654930][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.662483][ T285] device bridge_slave_0 entered promiscuous mode [ 22.671703][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.678928][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.686423][ T285] device bridge_slave_1 entered promiscuous mode [ 22.734916][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.742090][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.749522][ T288] device bridge_slave_0 entered promiscuous mode [ 22.773464][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.780537][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.787754][ T288] device bridge_slave_1 entered promiscuous mode [ 22.842472][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.849797][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.857433][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.864533][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.881613][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.888668][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.896330][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.903210][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.915411][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.922916][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.930130][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.937076][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.948407][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.955259][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.962557][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.969419][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.012993][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.019856][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.027427][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.034592][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.050540][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.057802][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.065171][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.072916][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.080367][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.087891][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.095195][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.102664][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.110861][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.119052][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.126948][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.137060][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.147506][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.186567][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.195455][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.204211][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.212539][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.219416][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.226662][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.234989][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.241987][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.249943][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.258351][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.265239][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.272357][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.280675][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.287800][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.295133][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.303200][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.310375][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.317980][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.326556][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.334425][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.342586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.350332][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.358260][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.365134][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.379981][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.388142][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.396319][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.404957][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.414193][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.422602][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.430741][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.437847][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.447785][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.455297][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.462839][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.471311][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.479724][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.486653][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.495426][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.503907][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.530383][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.538651][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.546552][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.554323][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.562481][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.570791][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.578632][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.587249][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.595945][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.603024][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.610784][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.618706][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.626996][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.636278][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.647324][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.655347][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.665369][ T285] device veth0_vlan entered promiscuous mode [ 23.675343][ T284] device veth0_vlan entered promiscuous mode [ 23.682756][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.690972][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.698383][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.706459][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.714821][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.722376][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.730990][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.742137][ T288] device veth0_vlan entered promiscuous mode [ 23.754148][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.761967][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.769987][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.777208][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.797372][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.805628][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.813921][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.822507][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.830718][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.839291][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.847627][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.856192][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.863838][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.873406][ T286] device veth0_vlan entered promiscuous mode [ 23.881557][ T284] device veth1_macvtap entered promiscuous mode [ 23.890565][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.898514][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.907269][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.915467][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.925292][ T285] device veth1_macvtap entered promiscuous mode [ 23.936044][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.944963][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.954393][ T288] device veth1_macvtap entered promiscuous mode [ 23.962544][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.971129][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.982507][ T287] device veth0_vlan entered promiscuous mode [ 23.992490][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.000506][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.008526][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.016452][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.026412][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.035085][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.043412][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.052639][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.068883][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.077186][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.085435][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.094450][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.103519][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.111650][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.134583][ T287] device veth1_macvtap entered promiscuous mode [ 24.144859][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.153739][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.162333][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.173934][ T286] device veth1_macvtap entered promiscuous mode [ 24.181417][ T288] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.200443][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.208417][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.221524][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.230867][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.238853][ C0] hrtimer: interrupt took 89901 ns [ 24.239254][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.252316][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.260804][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.269340][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.277360][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.625258][ T333] device veth1_macvtap left promiscuous mode [ 24.714462][ T333] device veth1_macvtap entered promiscuous mode [ 24.741193][ T333] device macsec0 entered promiscuous mode [ 24.761822][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.982356][ T358] device veth1_macvtap left promiscuous mode [ 25.031468][ T358] device veth1_macvtap entered promiscuous mode [ 25.038274][ T358] device macsec0 entered promiscuous mode [ 25.096903][ T360] device syzkaller0 entered promiscuous mode [ 25.152790][ T355] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.162339][ T355] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.970759][ T385] device veth0_vlan left promiscuous mode [ 26.016296][ T385] device veth0_vlan entered promiscuous mode [ 26.304735][ T24] kauditd_printk_skb: 42 callbacks suppressed [ 26.304746][ T24] audit: type=1400 audit(1731461332.890:118): avc: denied { create } for pid=392 comm="syz.3.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 26.448928][ T397] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.457035][ T397] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.600653][ T24] audit: type=1400 audit(1731461333.190:119): avc: denied { ioctl } for pid=396 comm="syz.0.32" path="/dev/ppp" dev="devtmpfs" ino=149 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.886421][ T413] device veth1_macvtap left promiscuous mode [ 26.968933][ T415] device veth1_macvtap entered promiscuous mode [ 26.975348][ T415] device macsec0 entered promiscuous mode [ 27.065017][ T411] Â: renamed from pim6reg1 [ 27.290584][ T426] device veth1_macvtap left promiscuous mode [ 27.297745][ T426] device macsec0 left promiscuous mode [ 27.356186][ T429] device veth1_macvtap entered promiscuous mode [ 27.368465][ T24] audit: type=1400 audit(1731461333.950:120): avc: denied { setopt } for pid=427 comm="syz.2.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.371945][ T429] device macsec0 entered promiscuous mode [ 27.529358][ T451] device veth1_macvtap left promiscuous mode [ 27.609478][ T454] device veth1_macvtap entered promiscuous mode [ 27.638883][ T454] device macsec0 entered promiscuous mode [ 27.695751][ T460] device veth1_macvtap left promiscuous mode [ 27.854239][ T460] device veth1_macvtap entered promiscuous mode [ 27.880116][ T460] device macsec0 entered promiscuous mode [ 27.903172][ T472] device veth1_macvtap left promiscuous mode [ 27.909904][ T472] device macsec0 left promiscuous mode [ 27.936354][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.946996][ T477] device veth1_macvtap entered promiscuous mode [ 27.953297][ T477] device macsec0 entered promiscuous mode [ 27.961411][ T476] device veth1_macvtap left promiscuous mode [ 27.967401][ T476] device macsec0 left promiscuous mode [ 28.046377][ T476] device veth1_macvtap entered promiscuous mode [ 28.058251][ T476] device macsec0 entered promiscuous mode [ 28.175095][ T24] audit: type=1400 audit(1731461334.760:121): avc: denied { create } for pid=491 comm="syz.4.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 28.221912][ T494] device veth1_macvtap left promiscuous mode [ 28.230176][ T494] device macsec0 left promiscuous mode [ 28.278509][ T494] device veth1_macvtap entered promiscuous mode [ 28.286098][ T494] device macsec0 entered promiscuous mode [ 28.341136][ T497] device veth1_macvtap left promiscuous mode [ 28.351850][ T497] device macsec0 left promiscuous mode [ 28.458223][ T24] audit: type=1400 audit(1731461335.040:122): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 28.482528][ T510] device veth1_macvtap left promiscuous mode [ 28.490792][ T510] device macsec0 left promiscuous mode [ 28.566982][ T510] device veth1_macvtap entered promiscuous mode [ 28.586006][ T510] device macsec0 entered promiscuous mode [ 28.618958][ T497] device veth1_macvtap entered promiscuous mode [ 28.631735][ T497] device macsec0 entered promiscuous mode [ 28.750846][ T24] audit: type=1400 audit(1731461335.340:123): avc: denied { create } for pid=528 comm="syz.3.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.821950][ T529] : port 1(veth0) entered blocking state [ 28.829198][ T24] audit: type=1400 audit(1731461335.370:124): avc: denied { create } for pid=528 comm="syz.3.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 28.864901][ T529] : port 1(veth0) entered disabled state [ 28.877829][ T529] device veth0 entered promiscuous mode [ 28.899744][ T24] audit: type=1400 audit(1731461335.380:125): avc: denied { write } for pid=528 comm="syz.3.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.946619][ T531] device veth1_macvtap left promiscuous mode [ 29.008633][ T531] device macsec0 left promiscuous mode [ 29.100528][ T536] device veth1_macvtap entered promiscuous mode [ 29.107945][ T536] device macsec0 entered promiscuous mode [ 29.129905][ T542] device veth1_macvtap left promiscuous mode [ 29.148617][ T542] device macsec0 left promiscuous mode [ 29.237900][ T550] device veth1_macvtap entered promiscuous mode [ 29.270942][ T550] device macsec0 entered promiscuous mode [ 29.311452][ T558] device veth1_macvtap left promiscuous mode [ 29.317920][ T558] device macsec0 left promiscuous mode [ 29.450693][ T561] device veth1_macvtap entered promiscuous mode [ 29.478880][ T561] device macsec0 entered promiscuous mode [ 29.804398][ T586] device veth1_macvtap left promiscuous mode [ 29.822607][ T586] device macsec0 left promiscuous mode [ 29.884621][ T24] audit: type=1400 audit(1731461336.470:126): avc: denied { read } for pid=593 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.915716][ T597] device veth1_macvtap entered promiscuous mode [ 29.925468][ T597] device macsec0 entered promiscuous mode [ 30.569201][ T646] device veth1_macvtap left promiscuous mode [ 30.575277][ T646] device macsec0 left promiscuous mode [ 30.584851][ T24] audit: type=1400 audit(1731461337.170:127): avc: denied { create } for pid=642 comm="syz.4.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 30.652368][ T646] device veth1_macvtap entered promiscuous mode [ 30.672255][ T646] device macsec0 entered promiscuous mode [ 30.788028][ T665] device veth0_to_bond entered promiscuous mode [ 31.318712][ T699] device veth1_macvtap left promiscuous mode [ 31.335085][ T699] device macsec0 left promiscuous mode [ 31.374539][ T702] device veth1_macvtap entered promiscuous mode [ 31.381300][ T702] device macsec0 entered promiscuous mode [ 31.391791][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.599745][ T721] device veth1_macvtap left promiscuous mode [ 31.616163][ T721] device macsec0 left promiscuous mode [ 31.675280][ T721] device veth1_macvtap entered promiscuous mode [ 31.681871][ T721] device macsec0 entered promiscuous mode [ 31.981941][ T24] audit: type=1400 audit(1731461338.570:128): avc: denied { setopt } for pid=744 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.001191][ T24] audit: type=1400 audit(1731461338.570:129): avc: denied { create } for pid=744 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 32.022004][ T24] audit: type=1400 audit(1731461338.570:130): avc: denied { ioctl } for pid=744 comm="syz.1.162" path="socket:[15955]" dev="sockfs" ino=15955 ioctlcmd=0x54cd scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.225913][ T761] device veth1_macvtap left promiscuous mode [ 32.259113][ T761] device macsec0 left promiscuous mode [ 32.353780][ T767] device veth1_macvtap entered promiscuous mode [ 32.370177][ T767] device macsec0 entered promiscuous mode [ 33.152938][ T812] device veth1_macvtap left promiscuous mode [ 33.209163][ T812] device macsec0 left promiscuous mode [ 33.286624][ T817] device veth1_macvtap entered promiscuous mode [ 33.299072][ T817] device macsec0 entered promiscuous mode [ 33.770638][ T845] device veth1_macvtap left promiscuous mode [ 33.824472][ T845] device macsec0 left promiscuous mode [ 33.915603][ T848] device veth1_macvtap entered promiscuous mode [ 33.931174][ T848] device macsec0 entered promiscuous mode [ 33.945261][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 34.042475][ T866] device veth1_macvtap left promiscuous mode [ 34.054023][ T866] device macsec0 left promiscuous mode [ 34.111036][ T866] device veth1_macvtap entered promiscuous mode [ 34.123102][ T866] device macsec0 entered promiscuous mode [ 34.421486][ T880] device veth1_macvtap left promiscuous mode [ 34.435007][ T880] device macsec0 left promiscuous mode [ 34.506959][ T880] device veth1_macvtap entered promiscuous mode [ 34.515293][ T880] device macsec0 entered promiscuous mode [ 34.584009][ T889] device veth1_macvtap left promiscuous mode [ 34.591069][ T889] device macsec0 left promiscuous mode [ 34.651069][ T889] device veth1_macvtap entered promiscuous mode [ 34.660303][ T889] device macsec0 entered promiscuous mode [ 34.675579][ T897] device veth1_macvtap left promiscuous mode [ 34.682582][ T897] device macsec0 left promiscuous mode [ 34.735707][ T897] device veth1_macvtap entered promiscuous mode [ 34.745916][ T897] device macsec0 entered promiscuous mode [ 34.784213][ T909] syz.0.229[909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.784278][ T909] syz.0.229[909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.798148][ T24] audit: type=1400 audit(1731461341.380:131): avc: denied { create } for pid=908 comm="syz.0.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 34.910226][ T919] device veth1_macvtap left promiscuous mode [ 34.916407][ T919] device macsec0 left promiscuous mode [ 34.992281][ T919] device veth1_macvtap entered promiscuous mode [ 35.000325][ T919] device macsec0 entered promiscuous mode [ 35.010067][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 35.343560][ T958] syz.2.249[958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.343611][ T958] syz.2.249[958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.356640][ T956] device veth1_macvtap left promiscuous mode [ 35.376600][ T956] device macsec0 left promiscuous mode [ 35.408478][ T956] device veth1_macvtap entered promiscuous mode [ 35.415136][ T956] device macsec0 entered promiscuous mode [ 35.452193][ T961] device veth1_macvtap left promiscuous mode [ 35.461047][ T961] device macsec0 left promiscuous mode [ 35.484913][ T961] device veth1_macvtap entered promiscuous mode [ 35.493256][ T961] device macsec0 entered promiscuous mode [ 35.543179][ T971] device pim6reg1 entered promiscuous mode [ 35.634111][ T981] device veth1_macvtap left promiscuous mode [ 35.640350][ T981] device macsec0 left promiscuous mode [ 35.671559][ T981] device veth1_macvtap entered promiscuous mode [ 35.678405][ T981] device macsec0 entered promiscuous mode [ 35.774183][ T991] device veth1_macvtap left promiscuous mode [ 35.787902][ T991] device macsec0 left promiscuous mode [ 35.834432][ T999] device veth1_macvtap entered promiscuous mode [ 35.836054][ T1001] syz.4.270[1001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.841094][ T1001] syz.4.270[1001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.853151][ T999] device macsec0 entered promiscuous mode [ 35.941631][ T1007] device veth1_macvtap left promiscuous mode [ 35.993764][ T1007] device macsec0 left promiscuous mode [ 36.391274][ T1056] device veth1_macvtap left promiscuous mode [ 36.397836][ T1056] device macsec0 left promiscuous mode [ 36.416510][ T1056] device veth1_macvtap entered promiscuous mode [ 36.427702][ T1056] device macsec0 entered promiscuous mode [ 36.991001][ T1086] device veth1_macvtap left promiscuous mode [ 36.997297][ T1086] device macsec0 left promiscuous mode [ 37.057048][ T1093] device veth1_macvtap left promiscuous mode [ 37.070448][ T1093] device macsec0 left promiscuous mode [ 37.125172][ T1093] device veth1_macvtap entered promiscuous mode [ 37.137284][ T1093] device macsec0 entered promiscuous mode [ 37.351727][ T1125] device veth1_macvtap left promiscuous mode [ 37.358168][ T1125] device macsec0 left promiscuous mode [ 37.408709][ T1125] device veth1_macvtap entered promiscuous mode [ 37.415652][ T1125] device macsec0 entered promiscuous mode [ 37.535384][ T1134] device veth1_macvtap entered promiscuous mode [ 37.548077][ T1134] device macsec0 entered promiscuous mode [ 37.568342][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.583568][ T1140] device veth1_macvtap left promiscuous mode [ 37.595326][ T1140] device macsec0 left promiscuous mode [ 37.635263][ T1147] device veth1_macvtap entered promiscuous mode [ 37.641988][ T1147] device macsec0 entered promiscuous mode [ 37.828784][ T1164] device veth1_macvtap left promiscuous mode [ 37.848363][ T1164] device macsec0 left promiscuous mode [ 37.893105][ T1175] device veth1_macvtap entered promiscuous mode [ 37.899376][ T1175] device macsec0 entered promiscuous mode [ 38.331703][ T24] audit: type=1400 audit(1731461344.920:132): avc: denied { relabelfrom } for pid=1226 comm="syz.4.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 38.425502][ T24] audit: type=1400 audit(1731461344.920:133): avc: denied { relabelto } for pid=1226 comm="syz.4.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 38.518623][ T1245] syz.2.372[1245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.518680][ T1245] syz.2.372[1245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.633463][ T1256] device veth1_macvtap left promiscuous mode [ 38.652189][ T1256] device macsec0 left promiscuous mode [ 38.699429][ T1256] device veth1_macvtap entered promiscuous mode [ 38.705973][ T1256] device macsec0 entered promiscuous mode [ 38.734669][ T1264] syz.4.382[1264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.734727][ T1264] syz.4.382[1264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.920546][ T1286] device syzkaller0 entered promiscuous mode [ 39.167831][ T1309] cgroup: syz.2.401 (1309) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 39.251349][ T1309] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 39.491545][ T1339] device veth1_macvtap entered promiscuous mode [ 39.499718][ T1339] device macsec0 entered promiscuous mode [ 39.536913][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 40.102194][ T24] audit: type=1400 audit(1731461346.690:134): avc: denied { create } for pid=1382 comm="syz.4.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 40.131036][ T1387] syz.2.432[1387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.131082][ T1387] syz.2.432[1387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.904425][ T24] audit: type=1400 audit(1731461347.490:135): avc: denied { create } for pid=1431 comm="syz.2.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 41.253933][ T1458] device veth1_macvtap left promiscuous mode [ 41.263446][ T1458] device macsec0 left promiscuous mode [ 41.375695][ T1458] device veth1_macvtap entered promiscuous mode [ 41.392893][ T1458] device macsec0 entered promiscuous mode [ 41.514860][ T1480] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.522026][ T1480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.532184][ T1480] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.539446][ T1480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.555120][ T1480] device bridge0 entered promiscuous mode [ 41.584829][ T1489] syz.3.471[1489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.584887][ T1489] syz.3.471[1489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.596491][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 41.721031][ T24] audit: type=1400 audit(1731461348.310:136): avc: denied { write } for pid=1503 comm="syz.3.479" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 41.756272][ T1502] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.763751][ T1502] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.773056][ T1502] device bridge0 left promiscuous mode [ 41.936763][ T1516] device syzkaller0 entered promiscuous mode [ 42.004041][ T1533] syz.3.490[1533] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.004097][ T1533] syz.3.490[1533] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.423265][ T1572] syz.3.505[1572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.439438][ T1572] syz.3.505[1572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.466328][ T24] audit: type=1400 audit(1731461349.040:137): avc: denied { create } for pid=1573 comm="syz.1.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 42.958334][ T1607] syz.2.519[1607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.958388][ T1607] syz.2.519[1607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.178376][ T1601] device syzkaller0 entered promiscuous mode [ 43.253109][ T1624] device wg2 entered promiscuous mode [ 43.294042][ T1635] device veth1_macvtap left promiscuous mode [ 43.301771][ T1635] device macsec0 left promiscuous mode [ 43.352585][ T1635] device veth1_macvtap entered promiscuous mode [ 43.360430][ T1635] device macsec0 entered promiscuous mode [ 43.456195][ T1653] device veth1_macvtap left promiscuous mode [ 43.465215][ T1653] device macsec0 left promiscuous mode [ 43.504244][ T1653] device veth1_macvtap entered promiscuous mode [ 43.511479][ T1653] device macsec0 entered promiscuous mode [ 43.705667][ T1666] device veth1_macvtap left promiscuous mode [ 43.714534][ T1666] device macsec0 left promiscuous mode [ 43.781967][ T1666] device veth1_macvtap entered promiscuous mode [ 43.788547][ T1666] device macsec0 entered promiscuous mode [ 43.805805][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 43.866862][ T1681] device veth1_macvtap left promiscuous mode [ 43.878637][ T1681] device macsec0 left promiscuous mode [ 43.926459][ T1687] device veth1_macvtap entered promiscuous mode [ 43.973084][ T1687] device macsec0 entered promiscuous mode [ 43.993260][ T1688] device veth1_macvtap left promiscuous mode [ 44.093730][ T1688] device macsec0 left promiscuous mode [ 44.163845][ T1700] device veth1_macvtap entered promiscuous mode [ 44.201421][ T1700] device macsec0 entered promiscuous mode [ 44.224427][ T1703] device sit0 entered promiscuous mode [ 44.332894][ T1722] device veth1_macvtap left promiscuous mode [ 44.341564][ T1722] device macsec0 left promiscuous mode [ 44.396222][ T1725] device veth1_macvtap entered promiscuous mode [ 44.416434][ T1725] device macsec0 entered promiscuous mode [ 44.490557][ T1743] device veth1_macvtap left promiscuous mode [ 44.507335][ T1743] device macsec0 left promiscuous mode [ 44.559192][ T1750] device veth1_macvtap entered promiscuous mode [ 44.566678][ T1750] device macsec0 entered promiscuous mode [ 44.614027][ T1759] device sit0 entered promiscuous mode [ 44.928004][ T1787] device veth1_macvtap left promiscuous mode [ 44.999162][ T1787] device macsec0 left promiscuous mode [ 45.092837][ T1787] device veth1_macvtap entered promiscuous mode [ 45.106941][ T1787] device macsec0 entered promiscuous mode [ 45.146444][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 45.290436][ T1804] device veth1_macvtap left promiscuous mode [ 45.303418][ T1804] device macsec0 left promiscuous mode [ 45.361973][ T1811] device veth1_macvtap entered promiscuous mode [ 45.371707][ T1811] device macsec0 entered promiscuous mode [ 45.703579][ T1842] device veth1_macvtap left promiscuous mode [ 45.716757][ T1842] device macsec0 left promiscuous mode [ 45.786848][ T1842] device veth1_macvtap entered promiscuous mode [ 45.795460][ T1842] device macsec0 entered promiscuous mode [ 45.918457][ T24] audit: type=1400 audit(1731461352.500:138): avc: denied { write } for pid=1864 comm="syz.1.627" name="cgroup.subtree_control" dev="cgroup2" ino=197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 45.968863][ T24] audit: type=1400 audit(1731461352.500:139): avc: denied { open } for pid=1864 comm="syz.1.627" path="" dev="cgroup2" ino=197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 46.163404][ T24] audit: type=1400 audit(1731461352.750:140): avc: denied { create } for pid=1920 comm="syz.0.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 46.223630][ T1929] device veth1_macvtap left promiscuous mode [ 46.231560][ T1929] device macsec0 left promiscuous mode [ 46.280629][ T1939] device veth1_macvtap entered promiscuous mode [ 46.287517][ T1939] device macsec0 entered promiscuous mode [ 46.323830][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 46.414451][ T1960] device veth1_macvtap left promiscuous mode [ 46.420763][ T1960] device macsec0 left promiscuous mode [ 46.871061][ T1981] device veth1_macvtap left promiscuous mode [ 46.919005][ T1981] device macsec0 left promiscuous mode [ 46.942681][ T1988] FAULT_INJECTION: forcing a failure. [ 46.942681][ T1988] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 46.978049][ T1988] CPU: 0 PID: 1988 Comm: syz.0.672 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 46.988205][ T1988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 46.998279][ T1988] Call Trace: [ 47.001402][ T1988] dump_stack_lvl+0x1e2/0x24b [ 47.006082][ T1988] ? bfq_pos_tree_add_move+0x43b/0x43b [ 47.011376][ T1988] dump_stack+0x15/0x17 [ 47.015457][ T1988] should_fail+0x3c6/0x510 [ 47.019729][ T1988] should_fail_alloc_page+0x52/0x60 [ 47.024758][ T1988] __alloc_pages_nodemask+0x1b3/0xaf0 [ 47.030311][ T1988] ? __kernel_text_address+0x9b/0x110 [ 47.035734][ T1988] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 47.041075][ T1988] ? stack_trace_save+0x113/0x1c0 [ 47.045923][ T1988] ? terminate_walk+0x407/0x4f0 [ 47.050612][ T1988] ? stack_trace_snprint+0xf0/0xf0 [ 47.055568][ T1988] skb_page_frag_refill+0x21b/0x410 [ 47.060595][ T1988] tun_get_user+0x6cb/0x38f0 [ 47.065018][ T1988] ? _kstrtoull+0x3a0/0x4a0 [ 47.069367][ T1988] ? tun_do_read+0x1f60/0x1f60 [ 47.073970][ T1988] ? kstrtouint_from_user+0x20a/0x2a0 [ 47.080402][ T1988] ? kstrtol_from_user+0x310/0x310 [ 47.085361][ T1988] ? avc_policy_seqno+0x1b/0x70 [ 47.090117][ T1988] ? selinux_file_permission+0x2bb/0x560 [ 47.095677][ T1988] ? fsnotify_perm+0x67/0x4e0 [ 47.100179][ T1988] tun_chr_write_iter+0x1a8/0x250 [ 47.105035][ T1988] vfs_write+0xb4c/0xe70 [ 47.109113][ T1988] ? kernel_write+0x3d0/0x3d0 [ 47.113646][ T1988] ? __fdget_pos+0x209/0x3a0 [ 47.118051][ T1988] ? ksys_write+0x77/0x2c0 [ 47.123196][ T1988] ksys_write+0x199/0x2c0 [ 47.127448][ T1988] ? __ia32_sys_read+0x90/0x90 [ 47.132096][ T1988] ? debug_smp_processor_id+0x17/0x20 [ 47.137242][ T1988] __x64_sys_write+0x7b/0x90 [ 47.141671][ T1988] do_syscall_64+0x34/0x70 [ 47.145913][ T1988] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 47.151909][ T1988] RIP: 0033:0x7fbac7374719 [ 47.156251][ T1988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.176185][ T1988] RSP: 002b:00007fbac5fed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 47.184427][ T1988] RAX: ffffffffffffffda RBX: 00007fbac752bf80 RCX: 00007fbac7374719 [ 47.192411][ T1988] RDX: 0000000000000015 RSI: 0000000020000000 RDI: 00000000000000c8 [ 47.200222][ T1988] RBP: 00007fbac5fed090 R08: 0000000000000000 R09: 0000000000000000 [ 47.208417][ T1988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.216305][ T1988] R13: 0000000000000000 R14: 00007fbac752bf80 R15: 00007ffec44ea6f8 [ 47.272460][ T24] audit: type=1400 audit(1731461353.860:141): avc: denied { create } for pid=1995 comm="syz.1.675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 47.298477][ T1981] device veth1_macvtap entered promiscuous mode [ 47.318837][ T24] audit: type=1400 audit(1731461353.880:142): avc: denied { create } for pid=1995 comm="syz.1.675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 47.341881][ T1981] device macsec0 entered promiscuous mode [ 47.413241][ T2008] device wg2 entered promiscuous mode [ 47.530890][ T2022] FAULT_INJECTION: forcing a failure. [ 47.530890][ T2022] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 47.569144][ T2022] CPU: 0 PID: 2022 Comm: syz.0.685 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 47.578889][ T2022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 47.589314][ T2022] Call Trace: [ 47.593042][ T2022] dump_stack_lvl+0x1e2/0x24b [ 47.597994][ T2022] ? bfq_pos_tree_add_move+0x43b/0x43b [ 47.603381][ T2022] dump_stack+0x15/0x17 [ 47.607452][ T2022] should_fail+0x3c6/0x510 [ 47.611890][ T2022] should_fail_usercopy+0x1a/0x20 [ 47.617012][ T2022] copy_page_from_iter+0x398/0x6e0 [ 47.622037][ T2022] tun_get_user+0x755/0x38f0 [ 47.626814][ T2022] ? _kstrtoull+0x3a0/0x4a0 [ 47.631383][ T2022] ? tun_do_read+0x1f60/0x1f60 [ 47.635972][ T2022] ? kstrtouint_from_user+0x20a/0x2a0 [ 47.641454][ T2022] ? kstrtol_from_user+0x310/0x310 [ 47.646396][ T2022] ? trie_delete_elem+0x59a/0x760 [ 47.651345][ T2022] ? queue_map_pop_elem+0x390/0x390 [ 47.656478][ T2022] ? avc_policy_seqno+0x1b/0x70 [ 47.661161][ T2022] ? selinux_file_permission+0x2bb/0x560 [ 47.666627][ T2022] ? fsnotify_perm+0x67/0x4e0 [ 47.671361][ T2022] tun_chr_write_iter+0x1a8/0x250 [ 47.676550][ T2022] vfs_write+0xb4c/0xe70 [ 47.680892][ T2022] ? putname+0xe7/0x140 [ 47.684872][ T2022] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 47.690745][ T2022] ? kernel_write+0x3d0/0x3d0 [ 47.695306][ T2022] ? __fdget_pos+0x209/0x3a0 [ 47.700202][ T2022] ? ksys_write+0x77/0x2c0 [ 47.704644][ T2022] ksys_write+0x199/0x2c0 [ 47.708811][ T2022] ? __ia32_sys_read+0x90/0x90 [ 47.713409][ T2022] ? debug_smp_processor_id+0x17/0x20 [ 47.718703][ T2022] __x64_sys_write+0x7b/0x90 [ 47.723402][ T2022] do_syscall_64+0x34/0x70 [ 47.728191][ T2022] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 47.733909][ T2022] RIP: 0033:0x7fbac7374719 [ 47.739099][ T2022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.758826][ T2022] RSP: 002b:00007fbac5fed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 47.767088][ T2022] RAX: ffffffffffffffda RBX: 00007fbac752bf80 RCX: 00007fbac7374719 [ 47.774892][ T2022] RDX: 0000000000000015 RSI: 0000000020000000 RDI: 00000000000000c8 [ 47.782971][ T2022] RBP: 00007fbac5fed090 R08: 0000000000000000 R09: 0000000000000000 [ 47.790766][ T2022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.798931][ T2022] R13: 0000000000000000 R14: 00007fbac752bf80 R15: 00007ffec44ea6f8 [ 47.858137][ T24] audit: type=1400 audit(1731461354.440:143): avc: denied { create } for pid=2035 comm="syz.2.690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 47.892969][ T2034] device wg2 left promiscuous mode [ 47.914096][ T2036] device veth1_macvtap left promiscuous mode [ 47.922138][ T2036] device macsec0 left promiscuous mode [ 48.028186][ T2036] device veth1_macvtap entered promiscuous mode [ 48.038284][ T2036] device macsec0 entered promiscuous mode [ 48.181669][ T2045] FAULT_INJECTION: forcing a failure. [ 48.181669][ T2045] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 48.205707][ T2045] CPU: 1 PID: 2045 Comm: syz.0.693 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 48.215535][ T2045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 48.225780][ T2045] Call Trace: [ 48.228904][ T2045] dump_stack_lvl+0x1e2/0x24b [ 48.233657][ T2045] ? bfq_pos_tree_add_move+0x43b/0x43b [ 48.238953][ T2045] dump_stack+0x15/0x17 [ 48.242960][ T2045] should_fail+0x3c6/0x510 [ 48.247370][ T2045] should_fail_alloc_page+0x52/0x60 [ 48.253566][ T2045] __alloc_pages_nodemask+0x1b3/0xaf0 [ 48.258861][ T2045] ? __kernel_text_address+0x9b/0x110 [ 48.264346][ T2045] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 48.269875][ T2045] ? stack_trace_save+0x113/0x1c0 [ 48.275067][ T2045] ? terminate_walk+0x407/0x4f0 [ 48.279823][ T2045] ? stack_trace_snprint+0xf0/0xf0 [ 48.284782][ T2045] skb_page_frag_refill+0x21b/0x410 [ 48.290670][ T2045] tun_get_user+0x6cb/0x38f0 [ 48.295197][ T2045] ? __kasan_check_write+0x14/0x20 [ 48.301439][ T2045] ? _kstrtoull+0x3a0/0x4a0 [ 48.305779][ T2045] ? tun_do_read+0x1f60/0x1f60 [ 48.310711][ T2045] ? kstrtouint_from_user+0x20a/0x2a0 [ 48.316297][ T2045] ? kstrtol_from_user+0x310/0x310 [ 48.322297][ T2045] ? trie_delete_elem+0x59a/0x760 [ 48.327865][ T2045] ? avc_policy_seqno+0x1b/0x70 [ 48.332740][ T2045] ? selinux_file_permission+0x2bb/0x560 [ 48.338257][ T2045] ? fsnotify_perm+0x67/0x4e0 [ 48.342941][ T2045] tun_chr_write_iter+0x1a8/0x250 [ 48.348130][ T2045] vfs_write+0xb4c/0xe70 [ 48.352184][ T2045] ? putname+0xe7/0x140 [ 48.356410][ T2045] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 48.362244][ T2045] ? kernel_write+0x3d0/0x3d0 [ 48.366844][ T2045] ? __fdget_pos+0x209/0x3a0 [ 48.371243][ T2045] ? ksys_write+0x77/0x2c0 [ 48.375489][ T2045] ksys_write+0x199/0x2c0 [ 48.379675][ T2045] ? __ia32_sys_read+0x90/0x90 [ 48.384279][ T2045] ? debug_smp_processor_id+0x17/0x20 [ 48.389696][ T2045] __x64_sys_write+0x7b/0x90 [ 48.394093][ T2045] do_syscall_64+0x34/0x70 [ 48.398993][ T2045] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 48.404702][ T2045] RIP: 0033:0x7fbac7374719 [ 48.408912][ T2045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.428639][ T2045] RSP: 002b:00007fbac5fed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 48.437148][ T2045] RAX: ffffffffffffffda RBX: 00007fbac752bf80 RCX: 00007fbac7374719 [ 48.445032][ T2045] RDX: 0000000000000015 RSI: 0000000020000000 RDI: 00000000000000c8 [ 48.453173][ T2045] RBP: 00007fbac5fed090 R08: 0000000000000000 R09: 0000000000000000 [ 48.461315][ T2045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 48.469210][ T2045] R13: 0000000000000000 R14: 00007fbac752bf80 R15: 00007ffec44ea6f8 [ 48.536384][ T2047] device syzkaller0 entered promiscuous mode [ 48.675334][ T2058] device veth1_macvtap left promiscuous mode [ 48.682753][ T2058] device macsec0 left promiscuous mode [ 48.754008][ T2058] device veth1_macvtap entered promiscuous mode [ 48.766538][ T2058] device macsec0 entered promiscuous mode [ 49.004873][ T2076] device veth1_macvtap left promiscuous mode [ 49.041038][ T2076] device macsec0 left promiscuous mode [ 49.095963][ T2082] device veth1_macvtap entered promiscuous mode [ 49.106534][ T2082] device macsec0 entered promiscuous mode [ 49.460252][ T2108] device veth0_vlan left promiscuous mode [ 49.482381][ T2108] device veth0_vlan entered promiscuous mode [ 49.543325][ T2114] device veth1_macvtap left promiscuous mode [ 49.552159][ T2114] device macsec0 left promiscuous mode [ 49.593188][ T2119] device veth1_macvtap entered promiscuous mode [ 49.604364][ T2119] device macsec0 entered promiscuous mode [ 49.743710][ T2141] ÿÿÿÿÿÿ: renamed from vlan1 [ 50.207972][ T2184] bpf_get_probe_write_proto: 2 callbacks suppressed [ 50.207982][ T2184] syz.4.747[2184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.260641][ T2184] syz.4.747[2184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.642258][ T2209] device pim6reg1 entered promiscuous mode [ 50.742383][ T2220] syz.2.762[2220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.742430][ T2220] syz.2.762[2220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.876185][ T2226] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.896432][ T2226] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.025070][ T2226] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.032235][ T2226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.040230][ T2226] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.047222][ T2226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.063867][ T2226] device bridge0 entered promiscuous mode [ 51.336427][ T2262] syz.1.780[2262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.336495][ T2262] syz.1.780[2262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.375756][ T2259] syz.3.779[2259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.391467][ T2259] syz.3.779[2259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.403188][ T24] audit: type=1400 audit(1731461357.990:144): avc: denied { remove_name } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 51.512635][ T24] audit: type=1400 audit(1731461357.990:145): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 51.862779][ T2286] device veth1_macvtap entered promiscuous mode [ 51.869570][ T2286] device macsec0 entered promiscuous mode [ 51.886873][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 52.065286][ T2293] syz.1.792[2293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.065341][ T2293] syz.1.792[2293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.116819][ T2295] device veth1_macvtap left promiscuous mode [ 52.135125][ T2295] device macsec0 left promiscuous mode [ 52.173752][ T2297] device veth1_macvtap left promiscuous mode [ 52.180540][ T2297] device macsec0 left promiscuous mode [ 52.206270][ T2295] device veth1_macvtap entered promiscuous mode [ 52.213680][ T2295] device macsec0 entered promiscuous mode [ 52.232749][ T2297] device veth1_macvtap entered promiscuous mode [ 52.240726][ T2297] device macsec0 entered promiscuous mode [ 52.363144][ T2314] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.503338][ T2326] device veth1_macvtap left promiscuous mode [ 52.509700][ T2326] device macsec0 left promiscuous mode [ 52.552960][ T2326] device veth1_macvtap entered promiscuous mode [ 52.560170][ T2326] device macsec0 entered promiscuous mode [ 52.648671][ T24] audit: type=1400 audit(1731461359.230:146): avc: denied { create } for pid=2338 comm="syz.1.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 52.836188][ T2358] device veth1_macvtap left promiscuous mode [ 52.842580][ T2358] device macsec0 left promiscuous mode [ 52.868277][ T2356] device veth1_macvtap left promiscuous mode [ 52.897656][ T2358] device veth1_macvtap entered promiscuous mode [ 52.905331][ T2358] device macsec0 entered promiscuous mode [ 52.927439][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 53.235637][ T24] audit: type=1400 audit(1731461359.820:147): avc: denied { create } for pid=2378 comm="syz.2.827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 53.414206][ T2392] : port 2(dummy0) entered blocking state [ 53.422471][ T2392] : port 2(dummy0) entered disabled state [ 53.429960][ T2392] device dummy0 entered promiscuous mode [ 53.437566][ T2393] device veth1_macvtap left promiscuous mode [ 53.444429][ T2393] device macsec0 left promiscuous mode [ 53.527833][ T2393] device veth1_macvtap entered promiscuous mode [ 53.586912][ T2393] device macsec0 entered promiscuous mode [ 53.903751][ T2440] device macsec0 left promiscuous mode [ 53.959346][ T2440] device veth1_macvtap entered promiscuous mode [ 53.966281][ T2440] device macsec0 entered promiscuous mode [ 53.990735][ T2445] device veth1_macvtap left promiscuous mode [ 53.998133][ T2445] device macsec0 left promiscuous mode [ 54.024730][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 54.037876][ T2450] device veth1_macvtap entered promiscuous mode [ 54.050023][ T2450] device macsec0 entered promiscuous mode [ 54.066997][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 54.141240][ T2455] FAULT_INJECTION: forcing a failure. [ 54.141240][ T2455] name failslab, interval 1, probability 0, space 0, times 1 [ 54.250773][ T2455] CPU: 0 PID: 2455 Comm: syz.4.860 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 54.260402][ T2455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 54.270542][ T2455] Call Trace: [ 54.273844][ T2455] dump_stack_lvl+0x1e2/0x24b [ 54.279065][ T2455] ? bfq_pos_tree_add_move+0x43b/0x43b [ 54.284427][ T2455] ? sched_clock+0x3a/0x40 [ 54.288681][ T2455] ? sched_clock_cpu+0x1b/0x3b0 [ 54.293646][ T2455] ? sched_clock+0x3a/0x40 [ 54.298007][ T2455] dump_stack+0x15/0x17 [ 54.302493][ T2455] should_fail+0x3c6/0x510 [ 54.306997][ T2455] ? sock_kmalloc+0x9c/0x100 [ 54.311693][ T2455] __should_failslab+0xa4/0xe0 [ 54.316290][ T2455] should_failslab+0x9/0x20 [ 54.320956][ T2455] __kmalloc+0x60/0x330 [ 54.325061][ T2455] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 54.331140][ T2455] sock_kmalloc+0x9c/0x100 [ 54.335576][ T2455] ____sys_sendmsg+0x219/0x8f0 [ 54.340352][ T2455] ? __sys_sendmsg_sock+0x40/0x40 [ 54.345292][ T2455] ? sched_clock_cpu+0x1b/0x3b0 [ 54.350187][ T2455] ? import_iovec+0xe5/0x120 [ 54.354696][ T2455] ___sys_sendmsg+0x252/0x2e0 [ 54.359210][ T2455] ? irq_exit_rcu+0x9/0x10 [ 54.363690][ T2455] ? __sys_sendmsg+0x280/0x280 [ 54.368349][ T2455] ? _raw_write_unlock_irqrestore+0x60/0x70 [ 54.374108][ T2455] ? __fdget+0x1bc/0x240 [ 54.378175][ T2455] __se_sys_sendmsg+0x1b1/0x280 [ 54.383021][ T2455] ? __x64_sys_sendmsg+0x90/0x90 [ 54.388122][ T2455] ? ksys_write+0x260/0x2c0 [ 54.392652][ T2455] ? debug_smp_processor_id+0x17/0x20 [ 54.398463][ T2455] __x64_sys_sendmsg+0x7b/0x90 [ 54.403082][ T2455] do_syscall_64+0x34/0x70 [ 54.407307][ T2455] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 54.413051][ T2455] RIP: 0033:0x7f7797991719 [ 54.417299][ T2455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.438409][ T2455] RSP: 002b:00007f779660a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 54.447105][ T2455] RAX: ffffffffffffffda RBX: 00007f7797b48f80 RCX: 00007f7797991719 [ 54.455213][ T2455] RDX: 0000000000000000 RSI: 0000000020001b00 RDI: 00000000000000c0 [ 54.463951][ T2455] RBP: 00007f779660a090 R08: 0000000000000000 R09: 0000000000000000 [ 54.473308][ T2455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.482110][ T2455] R13: 0000000000000000 R14: 00007f7797b48f80 R15: 00007ffcd1e88008 [ 54.554141][ T2481] device veth1_macvtap left promiscuous mode [ 54.568132][ T2481] device macsec0 left promiscuous mode [ 54.615014][ T2487] device veth1_macvtap left promiscuous mode [ 54.632461][ T2487] device macsec0 left promiscuous mode [ 54.681794][ T2481] device veth1_macvtap entered promiscuous mode [ 54.689764][ T2481] device macsec0 entered promiscuous mode [ 54.713676][ T2491] device veth1_macvtap entered promiscuous mode [ 54.721754][ T2491] device macsec0 entered promiscuous mode [ 54.952607][ T2520] FAULT_INJECTION: forcing a failure. [ 54.952607][ T2520] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 54.968107][ T2520] CPU: 0 PID: 2520 Comm: syz.2.886 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 54.978061][ T2520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 54.988322][ T2520] Call Trace: [ 54.991802][ T2520] dump_stack_lvl+0x1e2/0x24b [ 54.997108][ T2520] ? bfq_pos_tree_add_move+0x43b/0x43b [ 55.002433][ T2520] dump_stack+0x15/0x17 [ 55.006361][ T2520] should_fail+0x3c6/0x510 [ 55.010628][ T2520] should_fail_usercopy+0x1a/0x20 [ 55.015559][ T2520] _copy_from_user+0x20/0xd0 [ 55.020000][ T2520] ____sys_sendmsg+0x2f9/0x8f0 [ 55.024674][ T2520] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 55.030602][ T2520] ? __sys_sendmsg_sock+0x40/0x40 [ 55.035529][ T2520] ? import_iovec+0xe5/0x120 [ 55.039953][ T2520] ___sys_sendmsg+0x252/0x2e0 [ 55.044556][ T2520] ? __sys_sendmsg+0x280/0x280 [ 55.049160][ T2520] ? __fdget+0x1bc/0x240 [ 55.053334][ T2520] __se_sys_sendmsg+0x1b1/0x280 [ 55.058194][ T2520] ? __x64_sys_sendmsg+0x90/0x90 [ 55.063063][ T2520] ? __bpf_trace_sys_enter+0x62/0x70 [ 55.068182][ T2520] __x64_sys_sendmsg+0x7b/0x90 [ 55.072949][ T2520] do_syscall_64+0x34/0x70 [ 55.078483][ T2520] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 55.084493][ T2520] RIP: 0033:0x7f97bc5da719 [ 55.088757][ T2520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.109223][ T2520] RSP: 002b:00007f97bb253038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 55.118101][ T2520] RAX: ffffffffffffffda RBX: 00007f97bc791f80 RCX: 00007f97bc5da719 [ 55.126099][ T2520] RDX: 0000000000000000 RSI: 0000000020001b00 RDI: 00000000000000c0 [ 55.134110][ T2520] RBP: 00007f97bb253090 R08: 0000000000000000 R09: 0000000000000000 [ 55.142185][ T2520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 55.150055][ T2520] R13: 0000000000000000 R14: 00007f97bc791f80 R15: 00007ffc6cacf178 [ 55.210501][ T2532] device veth1_macvtap left promiscuous mode [ 55.216931][ T2532] device macsec0 left promiscuous mode [ 55.246572][ T2532] device veth1_macvtap entered promiscuous mode [ 55.259903][ T2532] device macsec0 entered promiscuous mode [ 55.627434][ T24] audit: type=1400 audit(1731461362.210:148): avc: denied { attach_queue } for pid=2551 comm="syz.1.899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 55.758338][ T2560] device veth1_macvtap left promiscuous mode [ 55.764463][ T2560] device macsec0 left promiscuous mode [ 55.794327][ T2560] device veth1_macvtap entered promiscuous mode [ 55.803029][ T2560] device macsec0 entered promiscuous mode [ 55.918704][ T2582] bpf_get_probe_write_proto: 4 callbacks suppressed [ 55.918715][ T2582] syz.4.911[2582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.926695][ T2582] syz.4.911[2582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.519084][ T2634] syz.4.929[2634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.539272][ T2634] syz.4.929[2634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.645332][ T2638] device veth1_macvtap left promiscuous mode [ 56.664188][ T2638] device macsec0 left promiscuous mode [ 56.739202][ T2641] device veth1_macvtap left promiscuous mode [ 56.745495][ T2641] device macsec0 left promiscuous mode [ 57.025130][ T2668] device veth1_macvtap left promiscuous mode [ 57.031665][ T2668] device macsec0 left promiscuous mode [ 57.323208][ T2705] device veth1_macvtap entered promiscuous mode [ 57.331398][ T2705] device macsec0 entered promiscuous mode [ 57.420118][ T24] audit: type=1400 audit(1731461364.010:149): avc: denied { create } for pid=2719 comm="syz.2.964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 57.991424][ T2776] device veth1_macvtap left promiscuous mode [ 57.997477][ T2776] device macsec0 left promiscuous mode [ 58.039751][ T2780] device veth1_macvtap entered promiscuous mode [ 58.047064][ T2780] device macsec0 entered promiscuous mode [ 58.058080][ T2776] device veth1_macvtap entered promiscuous mode [ 58.065353][ T2776] device macsec0 entered promiscuous mode [ 58.097443][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 58.441447][ T2805] device veth0_vlan left promiscuous mode [ 58.450748][ T2805] device veth0_vlan entered promiscuous mode [ 58.462850][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 58.471576][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 58.479638][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 58.544266][ T2812] device veth1_macvtap left promiscuous mode [ 58.556770][ T2812] device macsec0 left promiscuous mode [ 58.608842][ T2812] device veth1_macvtap entered promiscuous mode [ 58.623455][ T2812] device macsec0 entered promiscuous mode [ 59.631098][ T2872] device veth1_macvtap entered promiscuous mode [ 59.645954][ T2872] device macsec0 entered promiscuous mode [ 59.664411][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 60.664956][ T24] audit: type=1400 audit(1731461367.250:150): avc: denied { ioctl } for pid=2889 comm="syz.4.1035" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.486411][ T2949] device syzkaller0 entered promiscuous mode [ 61.705892][ T2978] device veth1_macvtap left promiscuous mode [ 61.713010][ T2978] device macsec0 left promiscuous mode [ 61.761855][ T2978] device veth1_macvtap entered promiscuous mode [ 61.773170][ T2978] device macsec0 entered promiscuous mode [ 61.868809][ T2994] device veth1_macvtap left promiscuous mode [ 61.874980][ T2994] device macsec0 left promiscuous mode [ 61.944314][ T2994] device veth1_macvtap entered promiscuous mode [ 61.955004][ T2994] device macsec0 entered promiscuous mode [ 61.977779][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 61.994347][ T2999] batadv_slave_1: mtu less than device minimum [ 62.429110][ T3019] FAULT_INJECTION: forcing a failure. [ 62.429110][ T3019] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 62.442546][ T3019] CPU: 0 PID: 3019 Comm: syz.0.1083 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 62.452534][ T3019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 62.462601][ T3019] Call Trace: [ 62.465885][ T3019] dump_stack_lvl+0x1e2/0x24b [ 62.470387][ T3019] ? bfq_pos_tree_add_move+0x43b/0x43b [ 62.475813][ T3019] dump_stack+0x15/0x17 [ 62.479793][ T3019] should_fail+0x3c6/0x510 [ 62.484035][ T3019] should_fail_alloc_page+0x52/0x60 [ 62.489063][ T3019] __alloc_pages_nodemask+0x1b3/0xaf0 [ 62.494276][ T3019] ? __kernel_text_address+0x9b/0x110 [ 62.499582][ T3019] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 62.505042][ T3019] ? stack_trace_save+0x113/0x1c0 [ 62.509901][ T3019] ? terminate_walk+0x407/0x4f0 [ 62.514598][ T3019] ? stack_trace_snprint+0xf0/0xf0 [ 62.519533][ T3019] skb_page_frag_refill+0x21b/0x410 [ 62.524573][ T3019] tun_get_user+0x6cb/0x38f0 [ 62.529035][ T3019] ? __kasan_check_write+0x14/0x20 [ 62.533959][ T3019] ? _kstrtoull+0x3a0/0x4a0 [ 62.538599][ T3019] ? tun_do_read+0x1f60/0x1f60 [ 62.543443][ T3019] ? kstrtouint_from_user+0x20a/0x2a0 [ 62.548732][ T3019] ? kstrtol_from_user+0x310/0x310 [ 62.553867][ T3019] ? trie_delete_elem+0x59a/0x760 [ 62.558723][ T3019] ? queue_stack_map_delete_elem+0x10/0x10 [ 62.564351][ T3019] ? avc_policy_seqno+0x1b/0x70 [ 62.569034][ T3019] ? selinux_file_permission+0x2bb/0x560 [ 62.574718][ T3019] ? fsnotify_perm+0x67/0x4e0 [ 62.579329][ T3019] tun_chr_write_iter+0x1a8/0x250 [ 62.584266][ T3019] vfs_write+0xb4c/0xe70 [ 62.588339][ T3019] ? putname+0xe7/0x140 [ 62.592344][ T3019] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 62.597974][ T3019] ? kernel_write+0x3d0/0x3d0 [ 62.602617][ T3019] ? __fdget_pos+0x209/0x3a0 [ 62.607014][ T3019] ? ksys_write+0x77/0x2c0 [ 62.611341][ T3019] ksys_write+0x199/0x2c0 [ 62.615516][ T3019] ? __ia32_sys_read+0x90/0x90 [ 62.620200][ T3019] ? debug_smp_processor_id+0x17/0x20 [ 62.625494][ T3019] __x64_sys_write+0x7b/0x90 [ 62.630209][ T3019] do_syscall_64+0x34/0x70 [ 62.634467][ T3019] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 62.640176][ T3019] RIP: 0033:0x7fbac7374719 [ 62.644409][ T3019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.664095][ T3019] RSP: 002b:00007fbac5fed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 62.672311][ T3019] RAX: ffffffffffffffda RBX: 00007fbac752bf80 RCX: 00007fbac7374719 [ 62.680129][ T3019] RDX: 0000000000000015 RSI: 0000000020000000 RDI: 00000000000000c8 [ 62.688036][ T3019] RBP: 00007fbac5fed090 R08: 0000000000000000 R09: 0000000000000000 [ 62.695840][ T3019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 62.703656][ T3019] R13: 0000000000000000 R14: 00007fbac752bf80 R15: 00007ffec44ea6f8 [ 62.930766][ T3047] FAULT_INJECTION: forcing a failure. [ 62.930766][ T3047] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 62.943935][ T3047] CPU: 0 PID: 3047 Comm: syz.4.1097 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 62.953629][ T3047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 62.963693][ T3047] Call Trace: [ 62.966830][ T3047] dump_stack_lvl+0x1e2/0x24b [ 62.971548][ T3047] ? bfq_pos_tree_add_move+0x43b/0x43b [ 62.976827][ T3047] dump_stack+0x15/0x17 [ 62.980857][ T3047] should_fail+0x3c6/0x510 [ 62.985097][ T3047] should_fail_usercopy+0x1a/0x20 [ 62.990034][ T3047] copy_page_from_iter+0x398/0x6e0 [ 62.994981][ T3047] tun_get_user+0x755/0x38f0 [ 62.999487][ T3047] ? _kstrtoull+0x3a0/0x4a0 [ 63.004083][ T3047] ? tun_do_read+0x1f60/0x1f60 [ 63.008683][ T3047] ? kstrtouint_from_user+0x20a/0x2a0 [ 63.013921][ T3047] ? kstrtol_from_user+0x310/0x310 [ 63.018994][ T3047] ? avc_policy_seqno+0x1b/0x70 [ 63.023650][ T3047] ? selinux_file_permission+0x2bb/0x560 [ 63.029136][ T3047] ? fsnotify_perm+0x67/0x4e0 [ 63.033743][ T3047] tun_chr_write_iter+0x1a8/0x250 [ 63.038619][ T3047] vfs_write+0xb4c/0xe70 [ 63.042688][ T3047] ? kernel_write+0x3d0/0x3d0 [ 63.047214][ T3047] ? __fdget_pos+0x209/0x3a0 [ 63.051641][ T3047] ? ksys_write+0x77/0x2c0 [ 63.056154][ T3047] ksys_write+0x199/0x2c0 [ 63.060385][ T3047] ? __ia32_sys_read+0x90/0x90 [ 63.064988][ T3047] ? debug_smp_processor_id+0x17/0x20 [ 63.070499][ T3047] __x64_sys_write+0x7b/0x90 [ 63.074899][ T3047] do_syscall_64+0x34/0x70 [ 63.079136][ T3047] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 63.084861][ T3047] RIP: 0033:0x7f7797991719 [ 63.089117][ T3047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 63.109176][ T3047] RSP: 002b:00007f779660a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 63.117604][ T3047] RAX: ffffffffffffffda RBX: 00007f7797b48f80 RCX: 00007f7797991719 [ 63.125699][ T3047] RDX: 0000000000000015 RSI: 0000000020000000 RDI: 00000000000000c8 [ 63.133967][ T3047] RBP: 00007f779660a090 R08: 0000000000000000 R09: 0000000000000000 [ 63.142293][ T3047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 63.150180][ T3047] R13: 0000000000000000 R14: 00007f7797b48f80 R15: 00007ffcd1e88008 [ 63.386104][ T3081] FAULT_INJECTION: forcing a failure. [ 63.386104][ T3081] name failslab, interval 1, probability 0, space 0, times 0 [ 63.399200][ T3081] CPU: 1 PID: 3081 Comm: syz.1.1110 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 63.408993][ T3081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 63.418973][ T3081] Call Trace: [ 63.422122][ T3081] dump_stack_lvl+0x1e2/0x24b [ 63.426633][ T3081] ? panic+0x812/0x812 [ 63.430693][ T3081] ? bfq_pos_tree_add_move+0x43b/0x43b [ 63.436070][ T3081] ? __alloc_pages_nodemask+0x435/0xaf0 [ 63.441629][ T3081] dump_stack+0x15/0x17 [ 63.445612][ T3081] should_fail+0x3c6/0x510 [ 63.449959][ T3081] ? __build_skb+0x2a/0x300 [ 63.454296][ T3081] __should_failslab+0xa4/0xe0 [ 63.459026][ T3081] should_failslab+0x9/0x20 [ 63.463329][ T3081] kmem_cache_alloc+0x3d/0x2e0 [ 63.468009][ T3081] __build_skb+0x2a/0x300 [ 63.472174][ T3081] build_skb+0x25/0x1e0 [ 63.476171][ T3081] tun_get_user+0x1bd6/0x38f0 [ 63.480683][ T3081] ? _kstrtoull+0x3a0/0x4a0 [ 63.485120][ T3081] ? tun_do_read+0x1f60/0x1f60 [ 63.489843][ T3081] ? kstrtouint_from_user+0x20a/0x2a0 [ 63.495045][ T3081] ? kstrtol_from_user+0x310/0x310 [ 63.499996][ T3081] ? avc_policy_seqno+0x1b/0x70 [ 63.504756][ T3081] ? selinux_file_permission+0x2bb/0x560 [ 63.510312][ T3081] ? fsnotify_perm+0x67/0x4e0 [ 63.514820][ T3081] tun_chr_write_iter+0x1a8/0x250 [ 63.519855][ T3081] vfs_write+0xb4c/0xe70 [ 63.523943][ T3081] ? kernel_write+0x3d0/0x3d0 [ 63.528445][ T3081] ? __fdget_pos+0x209/0x3a0 [ 63.532871][ T3081] ? ksys_write+0x77/0x2c0 [ 63.537214][ T3081] ksys_write+0x199/0x2c0 [ 63.541721][ T3081] ? __ia32_sys_read+0x90/0x90 [ 63.546313][ T3081] ? debug_smp_processor_id+0x17/0x20 [ 63.551513][ T3081] __x64_sys_write+0x7b/0x90 [ 63.555947][ T3081] do_syscall_64+0x34/0x70 [ 63.560275][ T3081] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 63.566002][ T3081] RIP: 0033:0x7f7485be2719 [ 63.570342][ T3081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 63.590154][ T3081] RSP: 002b:00007f748485b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 63.598376][ T3081] RAX: ffffffffffffffda RBX: 00007f7485d99f80 RCX: 00007f7485be2719 [ 63.606228][ T3081] RDX: 0000000000000015 RSI: 0000000020000000 RDI: 00000000000000c8 [ 63.614174][ T3081] RBP: 00007f748485b090 R08: 0000000000000000 R09: 0000000000000000 [ 63.621988][ T3081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 63.630040][ T3081] R13: 0000000000000000 R14: 00007f7485d99f80 R15: 00007ffe4ff5b738 [ 63.723030][ T3094] device veth1_macvtap left promiscuous mode [ 63.729693][ T3094] device macsec0 left promiscuous mode [ 63.748294][ T3094] device veth1_macvtap entered promiscuous mode [ 63.755774][ T3094] device macsec0 entered promiscuous mode [ 63.788943][ T3099] device syzkaller0 entered promiscuous mode [ 63.866819][ T3097] device pim6reg1 entered promiscuous mode [ 63.960218][ T3114] FAULT_INJECTION: forcing a failure. [ 63.960218][ T3114] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 63.973755][ T3114] CPU: 0 PID: 3114 Comm: syz.1.1123 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 63.983378][ T3114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 63.993687][ T3114] Call Trace: [ 63.996863][ T3114] dump_stack_lvl+0x1e2/0x24b [ 64.001565][ T3114] ? bfq_pos_tree_add_move+0x43b/0x43b [ 64.006951][ T3114] dump_stack+0x15/0x17 [ 64.011006][ T3114] should_fail+0x3c6/0x510 [ 64.015456][ T3114] should_fail_usercopy+0x1a/0x20 [ 64.020237][ T3114] _copy_to_user+0x20/0x90 [ 64.024502][ T3114] simple_read_from_buffer+0xc7/0x150 [ 64.029698][ T3114] proc_fail_nth_read+0x1a3/0x210 [ 64.034597][ T3114] ? proc_fault_inject_write+0x390/0x390 [ 64.040695][ T3114] ? security_file_permission+0x86/0xb0 [ 64.046078][ T3114] ? rw_verify_area+0x1c3/0x360 [ 64.050871][ T3114] ? proc_fault_inject_write+0x390/0x390 [ 64.057029][ T3114] vfs_read+0x200/0xba0 [ 64.061036][ T3114] ? kernel_read+0x70/0x70 [ 64.065505][ T3114] ? __kasan_check_write+0x14/0x20 [ 64.070434][ T3114] ? mutex_lock+0xa5/0x110 [ 64.074706][ T3114] ? mutex_trylock+0xa0/0xa0 [ 64.079210][ T3114] ? __fdget_pos+0x2e7/0x3a0 [ 64.083631][ T3114] ? ksys_read+0x77/0x2c0 [ 64.088013][ T3114] ksys_read+0x199/0x2c0 [ 64.092357][ T3114] ? vfs_write+0xe70/0xe70 [ 64.096598][ T3114] ? debug_smp_processor_id+0x17/0x20 [ 64.101904][ T3114] __x64_sys_read+0x7b/0x90 [ 64.106228][ T3114] do_syscall_64+0x34/0x70 [ 64.110746][ T3114] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 64.116838][ T3114] RIP: 0033:0x7f7485be115c [ 64.121081][ T3114] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 64.140888][ T3114] RSP: 002b:00007f748485b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 64.149141][ T3114] RAX: ffffffffffffffda RBX: 00007f7485d99f80 RCX: 00007f7485be115c [ 64.157034][ T3114] RDX: 000000000000000f RSI: 00007f748485b0a0 RDI: 0000000000000007 [ 64.165151][ T3114] RBP: 00007f748485b090 R08: 0000000000000000 R09: 0000000000000000 [ 64.173109][ T3114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 64.181097][ T3114] R13: 0000000000000000 R14: 00007f7485d99f80 R15: 00007ffe4ff5b738 [ 64.621801][ T3141] device veth1_macvtap left promiscuous mode [ 64.629751][ T3141] device macsec0 left promiscuous mode [ 64.685423][ T3141] device veth1_macvtap entered promiscuous mode [ 64.692347][ T3141] device macsec0 entered promiscuous mode [ 65.076730][ T3175] device veth1_macvtap left promiscuous mode [ 65.083693][ T3175] device macsec0 left promiscuous mode [ 65.128364][ T3175] device veth1_macvtap entered promiscuous mode [ 65.136913][ T3175] device macsec0 entered promiscuous mode [ 65.540980][ T24] audit: type=1400 audit(1731461372.130:151): avc: denied { create } for pid=3200 comm="syz.0.1159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 65.846654][ T3238] device veth1_macvtap left promiscuous mode [ 65.854793][ T3238] device macsec0 left promiscuous mode [ 65.873848][ T3238] device veth1_macvtap entered promiscuous mode [ 65.881608][ T3238] device macsec0 entered promiscuous mode [ 66.078417][ T3262] device veth1_macvtap left promiscuous mode [ 66.085727][ T3262] device macsec0 left promiscuous mode [ 66.121558][ T3262] device veth1_macvtap entered promiscuous mode [ 66.128799][ T3262] device macsec0 entered promiscuous mode [ 66.141299][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 66.184227][ T24] audit: type=1400 audit(1731461372.770:152): avc: denied { create } for pid=3270 comm="syz.4.1188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 83.427398][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.434282][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.441432][ T3316] device bridge_slave_0 entered promiscuous mode [ 83.456956][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.464013][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.471428][ T3316] device bridge_slave_1 entered promiscuous mode [ 83.523656][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.531877][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.539496][ T3321] device bridge_slave_0 entered promiscuous mode [ 83.548046][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.554976][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.562220][ T3321] device bridge_slave_1 entered promiscuous mode [ 83.580687][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.587707][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.595269][ T3317] device bridge_slave_0 entered promiscuous mode [ 83.604159][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.611149][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.618664][ T3317] device bridge_slave_1 entered promiscuous mode [ 83.656199][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.663123][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.670333][ T3320] device bridge_slave_0 entered promiscuous mode [ 83.678325][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.685238][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.692568][ T3320] device bridge_slave_1 entered promiscuous mode [ 83.728410][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.735370][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.742651][ T3319] device bridge_slave_0 entered promiscuous mode [ 83.751704][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.758561][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.766496][ T3319] device bridge_slave_1 entered promiscuous mode [ 83.805831][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.813215][ T3316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.820763][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.827621][ T3316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.871534][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.878633][ T3321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.886173][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.893029][ T3321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.937208][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.944092][ T3317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.951330][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.958378][ T3317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.990504][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.997924][ T652] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.005600][ T652] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.013281][ T652] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.020553][ T652] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.027597][ T652] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.035044][ T652] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.062497][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.072929][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.081518][ T652] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.088943][ T652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.096553][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.104985][ T652] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.111950][ T652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.139106][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.147761][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.156406][ T652] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.163334][ T652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.172734][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.181925][ T652] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.189331][ T652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.197183][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.205187][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.213488][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.221533][ T652] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.228541][ T652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.235872][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.243880][ T652] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.250757][ T652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.293343][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.302591][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.311617][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.323275][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.331648][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.345016][ T3317] device veth0_vlan entered promiscuous mode [ 84.355447][ T3321] device veth0_vlan entered promiscuous mode [ 84.363111][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 84.371468][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.380562][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 84.389159][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.397190][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.406666][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.414716][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 84.423373][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.432339][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 84.440409][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.448285][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 84.457155][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.465172][ T652] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.472185][ T652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.479486][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.486744][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.494057][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.501449][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.509081][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 84.522765][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.530452][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.537711][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 84.547185][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.555717][ T652] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.563115][ T652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.571501][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 84.579958][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.588114][ T652] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.595085][ T652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.604950][ T3317] device veth1_macvtap entered promiscuous mode [ 84.635822][ T3316] device veth0_vlan entered promiscuous mode [ 84.642941][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 84.650723][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 84.659184][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 84.667274][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 84.675829][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 84.683960][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.691834][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 84.700622][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.708699][ T652] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.715938][ T652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.723226][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.731517][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.739493][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 84.747518][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.755824][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.763882][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.771993][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 84.780202][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.788655][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 84.796679][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.804688][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.812224][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.838943][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.847203][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 84.856416][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 84.865135][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 84.873953][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 84.882533][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 84.890525][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 84.898644][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 84.907941][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 84.918639][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 84.927269][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 84.942331][ T3319] device veth0_vlan entered promiscuous mode [ 84.950904][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.959789][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.967091][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.984504][ T3316] device veth1_macvtap entered promiscuous mode [ 84.995876][ T3321] device veth1_macvtap entered promiscuous mode [ 85.002737][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 85.010608][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 85.018737][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 85.027389][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.035728][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.043328][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.063074][ T24] audit: type=1400 audit(1731461391.650:153): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 85.090038][ T3320] device veth0_vlan entered promiscuous mode [ 85.099864][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 85.109318][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 85.118515][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 85.127259][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 85.136760][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 85.146137][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 85.154775][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 85.163221][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 85.190976][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 85.206072][ T3319] device veth1_macvtap entered promiscuous mode [ 85.233884][ T3320] device veth1_macvtap entered promiscuous mode [ 85.248044][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 85.269944][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 85.278054][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 85.301456][ T3343] device veth1_macvtap left promiscuous mode [ 85.348653][ T3345] device veth1_macvtap left promiscuous mode [ 85.364815][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 85.373858][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 85.382651][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 85.391246][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 85.399802][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 85.408039][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 85.417198][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 85.425699][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 85.434429][ T3347] device veth1_macvtap entered promiscuous mode [ 85.441219][ T3347] device macsec0 entered promiscuous mode [ 85.452847][ T3348] device veth1_macvtap entered promiscuous mode [ 85.461175][ T3348] device macsec0 entered promiscuous mode [ 85.471205][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 85.480615][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 85.759357][ T3358] device syzkaller0 entered promiscuous mode [ 85.834190][ T3367] device pim6reg1 entered promiscuous mode [ 86.610021][ T7] device bridge_slave_1 left promiscuous mode [ 86.616117][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.623608][ T7] device bridge_slave_0 left promiscuous mode [ 86.630564][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.638083][ T7] device bridge_slave_1 left promiscuous mode [ 86.644203][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.652037][ T7] device bridge_slave_0 left promiscuous mode [ 86.659472][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.667239][ T7] device bridge_slave_1 left promiscuous mode [ 86.673950][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.681572][ T7] device bridge_slave_0 left promiscuous mode [ 86.687851][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.695848][ T7] device bridge_slave_1 left promiscuous mode [ 86.702071][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.709791][ T7] device bridge_slave_0 left promiscuous mode [ 86.716389][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.724847][ T7] device veth1_macvtap left promiscuous mode [ 86.731219][ T7] device veth0_vlan left promiscuous mode [ 86.736843][ T7] device veth1_macvtap left promiscuous mode [ 86.743547][ T7] device veth1_macvtap left promiscuous mode [ 86.749653][ T7] device veth0_vlan left promiscuous mode [ 86.755350][ T7] device veth1_macvtap left promiscuous mode [ 88.859920][ T7] device bridge_slave_1 left promiscuous mode [ 88.866121][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.873594][ T7] device bridge_slave_0 left promiscuous mode [ 88.879875][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.888058][ T7] device bridge_slave_1 left promiscuous mode [ 88.894203][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.901480][ T7] device bridge_slave_0 left promiscuous mode [ 88.907436][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.915637][ T7] device bridge_slave_1 left promiscuous mode [ 88.922041][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.930283][ T7] device bridge_slave_0 left promiscuous mode [ 88.937462][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.944981][ T7] device bridge_slave_1 left promiscuous mode [ 88.951005][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.958215][ T7] device bridge_slave_0 left promiscuous mode [ 88.964541][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.972041][ T7] device bridge_slave_1 left promiscuous mode [ 88.977959][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.985348][ T7] device bridge_slave_0 left promiscuous mode [ 88.992103][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.000497][ T7] device veth1_macvtap left promiscuous mode [ 89.006506][ T7] device veth0_vlan left promiscuous mode [ 89.012636][ T7] device veth1_macvtap left promiscuous mode [ 89.018961][ T7] device veth1_macvtap left promiscuous mode [ 89.024769][ T7] device veth0_vlan left promiscuous mode [ 89.030959][ T7] device veth1_macvtap left promiscuous mode [ 89.037032][ T7] device veth0_vlan left promiscuous mode [ 89.043041][ T7] device veth1_macvtap left promiscuous mode [ 89.049008][ T7] device veth0_vlan left promiscuous mode