last executing test programs: 1m0.142281144s ago: executing program 4 (id=7758): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) (async) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002a000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r5}, 0x10) (async) unlink(&(0x7f0000000140)='./cgroup\x00') r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) (async) close(r6) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/158}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000002a00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000340), &(0x7f00000000c0)=""/109}, 0x20) 1m0.088381975s ago: executing program 4 (id=7759): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3a66505}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x103500, 0x0) close(r4) (async) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r4, 0x40047451, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000002c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r8}, 0x10) (async) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r11}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) 59.154408488s ago: executing program 1 (id=7768): openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000080000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f28bd421850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x8, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c76d000000000000008100000081"], 0x48) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x15) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 59.04818632s ago: executing program 4 (id=7770): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000740)=ANY=[@ANYBLOB="9feb01001800000000000000500000005000000009000000000000000000000205000000070000000000000e0100000000000000000000000200000d0200000000000000020000000000000006000000000000000000000d000000000000000000000002000000000000000000002e5f"], 0x0, 0x71}, 0x28) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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", @ANYRESHEX], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0x54}, 0x32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0, 0xb7, &(0x7f0000000140)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x13, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) 59.0451719s ago: executing program 4 (id=7771): bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/148, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff79}, 0x16) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba88", 0x4}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r5) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0x20000000000003c3, &(0x7f0000000440)=ANY=[@ANYRES32=r8, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r7, 0x0, &(0x7f0000001780)=""/4096}, 0x20) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) r9 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="00000000000000000000947c00000000000000000000d6adb12bf2379fccab46ec1b0a85970c0ae4658d6aed11d713bdda9bf6622517c92c57cb14489c93d754571cadf21b660505179c1eb59b5212afe86504eded96d057592743c6e51b27cafd5f68693ab6b241621ab38f4c44dc780bb3c3d5780a5921", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1ff, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffffffffffc, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000bd5f6f8ffdabe4e2c13c0100aeedd2860004800000bb7fe602d7181900"/55], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) recvmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) 59.0446979s ago: executing program 1 (id=7772): r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x40) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5, 0x0, 0x8000000000000}, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r1, 0x0, 0xfffe}, 0x38) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xfffffffe}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r6, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000640)="b9ff0300100d690b98caa58c86dd", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000a00)=ANY=[@ANYRES32=r0, @ANYRES64=r6, @ANYBLOB="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"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x2d) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xd63a01, 0x0) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000040)={'virt_wifi0\x00', 0x400}) r9 = openat$tun(0xffffffffffffff9c, 0x0, 0x129800, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETQUEUE(r9, 0x400454d9, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r10}, &(0x7f0000000200), &(0x7f0000000240)='%-010d \x00'}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) 58.954131722s ago: executing program 0 (id=7773): r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) r1 = perf_event_open(&(0x7f0000000580)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x7, 0x0, 0x9f9, 0x200, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000380), 0xa}, 0xcac, 0x2, 0x5, 0x2, 0x452, 0x2, 0x8, 0x0, 0x8000, 0x0, 0xffffffff}, 0x0, 0x9, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0xaf84b4381f27b0f9, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) (async) close(r2) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x1, 0x40, 0x40}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_process_fork\x00', r4}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x1}, 0x50) (async) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0x6, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0xc, 0x3}, {0xb, 0x1}, {0x10, 0x5}, {0x10, 0x4}, {0xd, 0x5}, {0x2, 0x4}, {0x1, 0x4}, {0x8, 0x2}]}, @union={0x2, 0x3, 0x0, 0x5, 0x1, 0x14, [{0xd, 0x1, 0x8}, {0xd, 0x5, 0x3}, {0x4, 0x5, 0x1}]}, @func={0x2, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x2e, 0x2e, 0x2e, 0x30]}}, &(0x7f00000001c0)=""/233, 0xa6, 0xe9, 0x0, 0x1ff}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0xd, 0x63f7, 0x9, 0x20002, r6, 0x5, '\x00', 0x0, r7, 0x3, 0x1, 0x5, 0xb}, 0x50) (async) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, 0x0, 0x0) 58.684547335s ago: executing program 0 (id=7774): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x7fe2, 0x1}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x6, 0x0}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$TUNGETVNETLE(r5, 0x800454dd, &(0x7f00000001c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r6}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x1ff) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 58.532613178s ago: executing program 1 (id=7776): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x1}]}, {0x0, [0x2e, 0x2d]}}, &(0x7f00000009c0)=""/4096, 0x28, 0x1000, 0x1}, 0x28) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x4a) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001300)={r0, 0x18000000000002a0, 0x36, 0x0, &(0x7f0000000380)="b9ff03076844268cb8be14f086dd0f132673dc880f6c22a8ff028b28b46d9fdabc1ba654f15b8f19bf57c99e6e86169790620c186be1", 0x0, 0x20000005, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001300)={r0, 0x18000000000002a0, 0x36, 0x0, &(0x7f0000000380)="b9ff03076844268cb8be14f086dd0f132673dc880f6c22a8ff028b28b46d9fdabc1ba654f15b8f19bf57c99e6e86169790620c186be1", 0x0, 0x20000005, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 58.36128957s ago: executing program 2 (id=7778): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYRES16=r0, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) (async, rerun: 64) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0)='THAWED\x00', 0x7) sendmsg$inet(r5, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000600)=""/203, 0xcb}, {&(0x7f0000000400)=""/35, 0x23}, {&(0x7f0000000540)=""/149, 0x95}, {&(0x7f0000001c00)=""/209, 0xd1}], 0x4}, 0x0) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (rerun: 32) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x400000000200, 0x10068, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e00000004000000020000000008000000010000", @ANYRES32=r1, @ANYBLOB="ffffffff000000000000000098d2500b00000000", @ANYRES32=0x0, @ANYRESDEC=r3, @ANYBLOB="0000000003000000040000000800"/28], 0x50) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (rerun: 32) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x2}, 0x0, 0x0, 0xfffffffc, 0x1}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f00000006c0)=""/133}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0}, 0x18) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x64) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f00000001c0), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) r8 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r9 = openat$cgroup_procs(r8, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) (rerun: 64) write$cgroup_pid(r9, &(0x7f0000000380), 0x12) 58.236712782s ago: executing program 2 (id=7780): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x1ff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x72083, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x2}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x100, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10008, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x10000c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf58, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b00000000000000000000000080", @ANYRES16], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='\xfd]!:\'\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$cgroup_int(r1, &(0x7f0000000200)=0x410000000000d51e, 0x12) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) 58.161423633s ago: executing program 3 (id=7782): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0b0000000500b800000009000000010000006bf47bf560af5095e9e74eacfc8c870853fb6a53f07c28a7a4d22579e84ec65da71d867ede8b572bde7d9e607c1f0ab86c07a52968545aacb12d2bd33752f3e7c9cfff7d0f1f6aaa17092d8e277cf47eff206b56b1ef344c12f3681597d56a241eb06a569841faac101739d3fc433aecb4393ac5b00b07000000473d5ccd4b0f22d9ba48a6e9781419bbbe3573b7c06ed3623f8156e9d0264a06371ec7e942b193716d30353e6c15f5b34cf58f10e8d65095fb8e4929f04f30f6fb98e08007897c3ede4c5f4cb46ee855fd54c311d4cf752632cd5290c112104c5ea0d5a9bee0bbeb8fed4f00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r2}, 0x10) socketpair(0x6, 0x0, 0x3, &(0x7f00000006c0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r0}, &(0x7f0000000600), &(0x7f0000000800)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000000)={&(0x7f00000057c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000029c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 58.160748293s ago: executing program 4 (id=7783): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x40047451, &(0x7f0000000180)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000005000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dc}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000002c0)='ack_update_msk\x00', r7}, 0xffffffffffffffd8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xd53}, 0xc42a, 0x900000000000000, 0x7, 0x2, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 58.152490953s ago: executing program 3 (id=7784): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x94) (async, rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) (async) mkdir(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRESOCT=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x4040040) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x6, &(0x7f0000000300)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd6a}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000380)='GPL\x00', 0x2, 0xea, &(0x7f00000004c0)=""/234, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x2, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f00000008c0)=[{0x0, 0x5, 0x3, 0x5}, {0x1, 0x1, 0x1, 0x9}, {0x2, 0x2, 0x10, 0x1}, {0x3, 0x1, 0x2, 0xa}, {0x4, 0x1, 0x7, 0x6}, {0x5, 0x2, 0x9}, {0x5, 0x1, 0x7, 0x7}, {0x1, 0x4, 0x5, 0x6}, {0x5, 0x1, 0xd, 0x7}], 0x10, 0x1}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000004000000bb7f1a00c600feff0000000a0000534352c0d0b159f49b952758492b"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) (async, rerun: 32) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x7, &(0x7f0000000340)=ANY=[@ANYBLOB="7631c0bbd50c06c76f00000000000401ce251100"/31], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) (async) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000080)) (rerun: 32) 58.092272924s ago: executing program 3 (id=7785): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)=ANY=[@ANYRES16, @ANYRES32=r1, @ANYBLOB="ff04000000000000000000000000c1ccd89480fb2b6300000000000001e390f414e7512e54b75ffd33809e6eb4da7e4f40a01e233517c32e77c5c58a1b348235ae729bbb43777854899215ce819221d1867c9f2a8582c6867497e58a33e94119bf4978a241e67f6068d77cbf5f4913d304a5fc330d74311a05307cd33baa029031e7f072b4", @ANYRES32=0x0, @ANYRES32=r1, @ANYRESHEX=0x0, @ANYRES8=r2, @ANYRES64], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="77c489181100"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='freezer.state\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)=0x2) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r8, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) 57.969017766s ago: executing program 3 (id=7786): bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000060000200000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=r3, @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) sendmsg$tipc(r2, &(0x7f0000000040)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x3, {0x4e22}}, 0x10, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000008000000000000000100000604000000050000000000000000000000002e3e"], 0x0, 0x34}, 0x28) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004aa706dda0904000000000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) close(r10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB], 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x9}, 0x10800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, 0x0, &(0x7f0000000900), 0xce, r11}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r12) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/user\x00') 57.909371897s ago: executing program 2 (id=7787): r0 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0xb, 0x1, 0x0, 0x0, 0x200, 0x820, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0x1ff}, 0x0, 0xc48, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0x20000000000003c3, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r3, 0x0, &(0x7f0000001780)=""/4096}, 0x20) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) r5 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5802, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000080000850000007d"], 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r9}, 0x10) write$cgroup_int(r8, &(0x7f0000000200), 0x43451) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x5, 0x3, &(0x7f0000000b00)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x21}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r10) 57.816099508s ago: executing program 2 (id=7788): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2019, 0x0, 0x1, 0x0, 0x9, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000003000), 0x201, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 57.68017249s ago: executing program 0 (id=7789): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2, 0x0, 0x3}, 0x18) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000005000000000000000000021801000020646c2500001a7e6d9b781834279ae9d91a2e4fc20000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000400000085000000060000008500000050000000950000e09bb8da336a7868419bfe8290444928ec3b86e6f8fe7e5ec06aad2c39a1873ba390bb4418351a7134c4f362fb47eec28487254555aaefb8ba479eb8768171eeddbf2b1faa0434d25047fba134fa273835118a426a810ce5c031f57031ecd03085ed35"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x148c2, 0x0) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="62bbdea7d27aa483aeca20f8ffcbad52036a3724748a25f75089c4e53c6fee0dc431351750b1d5e22c1c387b63c20694e922dbcb67162f7ce94f885840e8d304fc84b9daa068"]) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0xc, &(0x7f0000001180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006c000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) (async) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r7}, 0x10) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r9, 0x4004743c, 0xf0ff1f00000000) (async) write$cgroup_devices(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1e03"], 0xffdd) 57.640272891s ago: executing program 3 (id=7790): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff0000, 0x9, 0x0, 0x2, 0x0, 0x9ba5}, 0x0, 0x20000000000, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r3}, &(0x7f0000000800), &(0x7f0000000840)=r4}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x8}, 0x0, 0xc8, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r8}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 57.585494161s ago: executing program 0 (id=7791): r0 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x69, 0x11, 0x4e}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000a000000080000000000000700000000000000000000000d03000000010000000000000e040000000000000000000000000000010000000000000000002e0800000000005f"], &(0x7f00000004c0)=""/204, 0x5a, 0xcc, 0x1}, 0x28) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6d50745d}, 0x0, 0x0, r0, 0x0) syz_clone(0x4080b000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x8}, 0x8) 57.585130732s ago: executing program 1 (id=7792): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES8=r0], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000600000004000000000000070000000000000000da000398e16feaa02baf88847629b842b74da3b8070bd221522aa17166419009eafb94146e0030ab4159806983f17bc91dfd5b37b0e002a15392f7ae4e574f7cc38107791adf0f6bbf5ba9c62608652ff7f10f"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x1}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'wg2\x00', 0x1000}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x80}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) 57.556469202s ago: executing program 1 (id=7793): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000600000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x1d, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x200}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0xffffffffffffffff, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @alu={0x7, 0x1, 0x3, 0x0, 0x7, 0x0, 0x10}], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r2}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x4000, 0x0) r3 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000600)=@base={0xa, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000680)={{r0, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)='%+9llu \x00'}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180200000000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x0, 0xf00}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)=r5}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x40, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r9, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(r10, 0x400454da, &(0x7f0000000400)=r11) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a40)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0x94, 0x3, [@union={0x9, 0x6, 0x0, 0x5, 0x1, 0x3, [{0x9, 0x3, 0x1}, {0x8, 0x0, 0x3}, {0x5, 0x3, 0x8}, {0x8, 0x2, 0x9}, {0x5, 0x4, 0x80}, {0xa, 0x5, 0x6}]}, @volatile={0xf, 0x0, 0x0, 0x9, 0x5}, @float={0x10, 0x0, 0x0, 0x10, 0x2}, @const={0x6, 0x0, 0x0, 0xa, 0x2}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x2e, 0x0, 0x29, 0x2}, @type_tag={0x2, 0x0, 0x0, 0x12, 0x5}]}, {0x0, [0x2e]}}, &(0x7f0000000980)=""/2, 0xaf, 0x2, 0x1, 0x7}, 0x28) r13 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b40)=@generic={&(0x7f0000000b00)='./file0\x00', 0x0, 0x10}, 0x18) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000c00)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x9, 0x14, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80000001}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000840)='syzkaller\x00', 0xc, 0x36, &(0x7f0000000880)=""/54, 0x41000, 0x3, '\x00', r11, @cgroup_sock=0x2, r12, 0x8, &(0x7f0000000a80)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000ac0)={0x1, 0xe, 0x8, 0xf795}, 0x10, 0x0, r13, 0x8, &(0x7f0000000b80)=[r4, r14, r0], &(0x7f0000000c80)=[{0x2, 0x2, 0x2, 0x7}, {0x0, 0x3, 0x2}, {0x2, 0x2, 0x7, 0x8}, {0x1, 0x5, 0x7}, {0x2, 0x3, 0x7, 0x2}, {0x0, 0x1, 0x1, 0x7}, {0x0, 0x2, 0xc, 0x3}, {0x2, 0x2, 0x10, 0x5}], 0x10, 0x8}, 0x94) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r15, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81343a8800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r16}, 0x10) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='fsi_master_gpio_cmd_abs_addr\x00', r1, 0x0, 0x3}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r17}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 57.547430702s ago: executing program 2 (id=7794): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYRES8=0x0], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r1, @ANYBLOB="ff00000000000000000000000000000000000004", @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="000000000400"/28], 0x50) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6151, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r6, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[], 0xfdef) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0x7, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r1}, 0x8) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r11, 0x0, 0x0) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) (rerun: 64) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 57.465388353s ago: executing program 4 (id=7795): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000022000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e0500009cb20d03e7564c35a8d36774d5e5003a14817ac61e4dd19699a13477bf7e060e3670ef0e789f65f105006704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a080600000002000000ff000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3957663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964ecbeba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c338615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef66fa03a99b5c1c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000007000000080000000000002e2e0000"], &(0x7f0000001b80)=""/4096, 0x2f, 0x1000, 0x1, 0xbf7, 0x10000}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1d, 0x14, 0x0, 0x4, 0x8000, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0, @value=r2}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0, @exit, @alu={0x5, 0x1, 0xb, 0xa, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xec, &(0x7f00000004c0)=""/236}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000008"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x8, 0x4, 0xfff, 0x5, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000180)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r5, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0), 0x0, 0x8d, &(0x7f0000000500), 0x0, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x48, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xa, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x7aa}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="260a00000000c5ec28387a38cbeb70736e1445e757af93ecb07e000061108c000000002e0036"], &(0x7f0000000000)='GPL\x00'}, 0x80) 57.460870074s ago: executing program 0 (id=7796): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async, rerun: 64) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) (async, rerun: 64) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x94) (async, rerun: 32) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) (async, rerun: 32) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r6}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000080)) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a2, &(0x7f0000000080)) 57.391020584s ago: executing program 2 (id=7797): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000069000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000540)) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r0}, 0x10) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000007000000020000000400000005"], 0x87) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1020d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200, 0xc8, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000fb96e325bb7591e15a4ec4e9a724d14f699db9e1a7b7f20f294408319aef68c92118d4a0372899f9e37338750db221fb240d0ecaa885adad299e7351d19c80999e134e06", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40000002) write$cgroup_subtree(r9, &(0x7f0000000180)=ANY=[@ANYRESOCT=r6], 0xfdef) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x16, &(0x7f0000000880)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r10}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x80000000}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) (rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c76d000000000000008100000081"], 0x48) write$cgroup_subtree(r13, &(0x7f0000000000)=ANY=[], 0x15) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000500000005000000002000000000000000700000d02000000030000000000000005000000000000000b0000003f00000010000000000000000c0000000000000000000000ffffffff090000000300000000000000000000020200"], &(0x7f00000000c0)=""/189, 0x6a, 0xbd, 0x1}, 0x20) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 57.366505975s ago: executing program 0 (id=7798): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000e00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) recvmsg$unix(r0, 0x0, 0x140) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000b40)}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={0xffffffffffffffff, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000900)=[0x0], 0x0, 0x69, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), 0x8, 0x75, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) (async) close(r7) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 57.365633185s ago: executing program 1 (id=7799): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r1}, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000002000000000080000000df285e", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES8, @ANYRES32, @ANYBLOB="ffffffffffff2700"/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000400)=ANY=[@ANYRESHEX=r2, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000850000000e0000009500000000000000"], &(0x7f0000000480)='syzkaller\x00', 0xd, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x4, &(0x7f0000000540)=ANY=[@ANYRESOCT=r1], 0x0, 0x7ff}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYRES32=r4], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000066b8bb423ca88a6bb542c4a18474b499e24d9a0100000001000000d8d1e8cf02e9500c2fb9b7ab0a35b0376356e6c7d879ea4d40c188a5335f3ef0be37a577fc585b598bf666d930d3439579c1b734a69035c44b722716d32c0ca77563cb5dce6ba97dbfab8ff58a4a6efc5078eced5779d4e3fe588bf21fa9f5a6e828e499993af9be929030cd6ba9c8be17c8abbc398a8a9a894687dd3c0bea5c90a9affb1c48ba17d6461e09657a1a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000016c, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080800000000007b8af8ff00000000bfa2000000000000076cb4d03100000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r6}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f00000004c0)={0x1, &(0x7f0000000280)=[{0x1, 0x53, 0x10, 0x1}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) write$cgroup_int(r9, &(0x7f0000000780)=0x5, 0x12) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0xb00000000000000, &(0x7f00000007c0)=ANY=[@ANYBLOB="08000000040000000400000022bf000000000000", @ANYRES32, @ANYBLOB="ffffffff00"/20, @ANYRES32=r11, @ANYRES32, @ANYBLOB="00000000040000daf1e15c52285db4a3212415fe6ae1ffffff0000000000000000004f757701e6b4024cfc96b3d84e7d0000000000000000"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000940)={r5, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x20, 0xc, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040800001805e4fa80f3266d00000095000000f7ddfcdadca98e51e6d100000000b000f0ff0100000095000002103b9c9eb642e500000000009d846f8206328e8db3d94f76493b41020063568e5f16986e4a040e5acf71997c120e348a730135db2c8e219ceb3a6ece630b44f1af493a662d944269fe7356380cfae8e07f112f3a305fa2de90590543e81748aa6ab931d6ef94ecf1e04e10889238dc700a95fcc41d33e62d30980bbec39f71650d94a468009ecd21c7fdf8a526a1cb0cdbf8e2fe137c9008dedfe8"], &(0x7f0000000840)='GPL\x00', 0x5, 0x23, &(0x7f0000000880)=""/35, 0x40f00, 0xc, '\x00', r11, @netfilter=0x2d, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0x2, 0x5, 0xffffffff}, 0x10, 0x0, r10, 0x0, &(0x7f0000000980)=[r3, r12, r5, r0, r0], 0x0, 0x10, 0x7}, 0xfffffff0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r10}, 0x10) write$cgroup_int(r9, &(0x7f0000000200), 0x43451) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x5, &(0x7f0000000000)=ANY=[@ANYRES32=r4], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r14, 0x0, 0x10, 0x10, &(0x7f0000000080)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x30) write$cgroup_int(r13, &(0x7f0000000200), 0x43451) 57.364987665s ago: executing program 3 (id=7800): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000000e3ffffff1800"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb6, 0x0, 0x0, 0x0, 0x80}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0x2, 0x6, 0x7f, 0x40100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000540)=ANY=[@ANYRESDEC=r3, @ANYRES32, @ANYBLOB="0004000000000000b708001b000000007b8adaff00000000bfa200000000000007020000f8ffffffb7030000080000860000000000f365467eda466218bae6d5af6d6eba750000f7ffffff0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff25) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="010000000000000000000000a5d789c6e9fa4f4f745dfd8f55495d418535648ff5703618500d614ea1209f16a8ec954b7c10d26910a62ba2dabce9e39e4f791f3152000e466326f8265b5c953c", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) 2.454723674s ago: executing program 32 (id=7798): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000e00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) recvmsg$unix(r0, 0x0, 0x140) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000b40)}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={0xffffffffffffffff, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000900)=[0x0], 0x0, 0x69, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), 0x8, 0x75, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) (async) close(r7) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.413316455s ago: executing program 33 (id=7799): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r1}, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000002000000000080000000df285e", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES8, @ANYRES32, @ANYBLOB="ffffffffffff2700"/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000400)=ANY=[@ANYRESHEX=r2, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000850000000e0000009500000000000000"], &(0x7f0000000480)='syzkaller\x00', 0xd, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x4, &(0x7f0000000540)=ANY=[@ANYRESOCT=r1], 0x0, 0x7ff}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYRES32=r4], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000066b8bb423ca88a6bb542c4a18474b499e24d9a0100000001000000d8d1e8cf02e9500c2fb9b7ab0a35b0376356e6c7d879ea4d40c188a5335f3ef0be37a577fc585b598bf666d930d3439579c1b734a69035c44b722716d32c0ca77563cb5dce6ba97dbfab8ff58a4a6efc5078eced5779d4e3fe588bf21fa9f5a6e828e499993af9be929030cd6ba9c8be17c8abbc398a8a9a894687dd3c0bea5c90a9affb1c48ba17d6461e09657a1a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000016c, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080800000000007b8af8ff00000000bfa2000000000000076cb4d03100000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r6}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f00000004c0)={0x1, &(0x7f0000000280)=[{0x1, 0x53, 0x10, 0x1}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) write$cgroup_int(r9, &(0x7f0000000780)=0x5, 0x12) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0xb00000000000000, &(0x7f00000007c0)=ANY=[@ANYBLOB="08000000040000000400000022bf000000000000", @ANYRES32, @ANYBLOB="ffffffff00"/20, @ANYRES32=r11, @ANYRES32, @ANYBLOB="00000000040000daf1e15c52285db4a3212415fe6ae1ffffff0000000000000000004f757701e6b4024cfc96b3d84e7d0000000000000000"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000940)={r5, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x20, 0xc, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040800001805e4fa80f3266d00000095000000f7ddfcdadca98e51e6d100000000b000f0ff0100000095000002103b9c9eb642e500000000009d846f8206328e8db3d94f76493b41020063568e5f16986e4a040e5acf71997c120e348a730135db2c8e219ceb3a6ece630b44f1af493a662d944269fe7356380cfae8e07f112f3a305fa2de90590543e81748aa6ab931d6ef94ecf1e04e10889238dc700a95fcc41d33e62d30980bbec39f71650d94a468009ecd21c7fdf8a526a1cb0cdbf8e2fe137c9008dedfe8"], &(0x7f0000000840)='GPL\x00', 0x5, 0x23, &(0x7f0000000880)=""/35, 0x40f00, 0xc, '\x00', r11, @netfilter=0x2d, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0x2, 0x5, 0xffffffff}, 0x10, 0x0, r10, 0x0, &(0x7f0000000980)=[r3, r12, r5, r0, r0], 0x0, 0x10, 0x7}, 0xfffffff0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r10}, 0x10) write$cgroup_int(r9, &(0x7f0000000200), 0x43451) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x5, &(0x7f0000000000)=ANY=[@ANYRES32=r4], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r14, 0x0, 0x10, 0x10, &(0x7f0000000080)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x30) write$cgroup_int(r13, &(0x7f0000000200), 0x43451) 2.413053215s ago: executing program 34 (id=7797): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000069000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000540)) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r0}, 0x10) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000007000000020000000400000005"], 0x87) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1020d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200, 0xc8, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000fb96e325bb7591e15a4ec4e9a724d14f699db9e1a7b7f20f294408319aef68c92118d4a0372899f9e37338750db221fb240d0ecaa885adad299e7351d19c80999e134e06", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40000002) write$cgroup_subtree(r9, &(0x7f0000000180)=ANY=[@ANYRESOCT=r6], 0xfdef) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x16, &(0x7f0000000880)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r10}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x80000000}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) (rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c76d000000000000008100000081"], 0x48) write$cgroup_subtree(r13, &(0x7f0000000000)=ANY=[], 0x15) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000500000005000000002000000000000000700000d02000000030000000000000005000000000000000b0000003f00000010000000000000000c0000000000000000000000ffffffff090000000300000000000000000000020200"], &(0x7f00000000c0)=""/189, 0x6a, 0xbd, 0x1}, 0x20) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 2.403390385s ago: executing program 35 (id=7800): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000000e3ffffff1800"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb6, 0x0, 0x0, 0x0, 0x80}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0x2, 0x6, 0x7f, 0x40100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000540)=ANY=[@ANYRESDEC=r3, @ANYRES32, @ANYBLOB="0004000000000000b708001b000000007b8adaff00000000bfa200000000000007020000f8ffffffb7030000080000860000000000f365467eda466218bae6d5af6d6eba750000f7ffffff0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff25) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="010000000000000000000000a5d789c6e9fa4f4f745dfd8f55495d418535648ff5703618500d614ea1209f16a8ec954b7c10d26910a62ba2dabce9e39e4f791f3152000e466326f8265b5c953c", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) 2.370568396s ago: executing program 36 (id=7795): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000007000000080000000000002e2e0000"], &(0x7f0000001b80)=""/4096, 0x2f, 0x1000, 0x1, 0xbf7, 0x10000}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1d, 0x14, 0x0, 0x4, 0x8000, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0, @value=r2}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0, @exit, @alu={0x5, 0x1, 0xb, 0xa, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xec, &(0x7f00000004c0)=""/236}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000008"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x8, 0x4, 0xfff, 0x5, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000180)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r5, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0), 0x0, 0x8d, &(0x7f0000000500), 0x0, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x48, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xa, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x7aa}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="260a00000000c5ec28387a38cbeb70736e1445e757af93ecb07e000061108c000000002e0036"], &(0x7f0000000000)='GPL\x00'}, 0x80) 190.956117ms ago: executing program 8 (id=7804): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="06000000047ffa9fc4c6d5000000040000000100fed880000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYBLOB="a45b9e0cdfff9ae02686be7427ea3a5bc8", @ANYRES16=0x0, @ANYBLOB="000000000100"/28], 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="06000000047ffa9fc4c6d5000000040000000100fed880000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYBLOB="a45b9e0cdfff9ae02686be7427ea3a5bc8", @ANYRES16=0x0, @ANYBLOB="000000000100"/28], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b70300000000000085000000730000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0xffffff82, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x4, 0x0, 0x3, 0x10000504, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000080000000000000000000000c1dca30de2b94c894046135605378da4adf1b583bb64d58f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r2, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000b73548c2280a77bd2b121e384bba82fcd17e16b50561339b5d8f3fdbaf03fafa9527163a5d079add86794974d69ebc4cf48e9974745b372377535cca89ea21ef9c0d34a329275a393e24dd8c14dad5298eabe69c7bb5efd87a45c2f6163d4a85f883c181", @ANYRES64=r1, @ANYRES8], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000000000080000000000bfa2b703000008000000b70400000000000085000000820000009500000000000000c21ed40683fcf6543f71b044fb9f0278f21200"/90], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000000000080000000000bfa2b703000008000000b70400000000000085000000820000009500000000000000c21ed40683fcf6543f71b044fb9f0278f21200"/90], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000006b0000008500b10000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="0000ef000000000000000000000800"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r9}, 0x10) close(r7) (async) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r10, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT=r3, @ANYRESOCT=r7], 0x18, 0x4010}, 0x0) sendmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r11], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) close(r12) (async) close(r12) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x68001, 0x0) (async) r13 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x68001, 0x0) ioctl$TUNSETOFFLOAD(r13, 0xc004743e, 0x110e22fff7) write$cgroup_subtree(r6, 0x0, 0x9) openat$tun(0xffffffffffffff9c, 0x0, 0x20000, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) 132.108628ms ago: executing program 5 (id=7801): bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800040000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[], 0x66) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x5e, 0x43, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0x4, &(0x7f0000000340)={r4, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r5}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000006000000020000000100000604000000020000000000000000002e3025"], &(0x7f0000000780)=""/4096, 0x32, 0x1000, 0x1}, 0x20) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 19.73686ms ago: executing program 8 (id=7806): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x0, 0x0, 0x0, 0xe, 0x0, 0x800000000200, 0x20, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/11, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000a50000000300040095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x2001000, &(0x7f0000000340)="6e4c58bd7e", 0x5, &(0x7f0000000380), 0x0, &(0x7f0000000400)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000040)={'xfrm0\x00', 0xd00}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x1) 0s ago: executing program 6 (id=7802): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb010018000000002000000004000000030000000100000f0000000407000000000000000c000000000000040000000000002e0089b7bd5ddb48a69bb03b57afd148bb9140174fc630d9dc9de380fa962f6a46eb3d1da513b8e12d0079e4f4514a9988dace03cb00aa2191360d1e2c8642207d90dde8878675b5d1770f1ced91278caa34d9f553a5e4b5e9a518f05fab4a29756290cb76e235e100000000000000"], 0x0, 0x3c, 0x0, 0x1}, 0x28) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async, rerun: 32) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (rerun: 32) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedbf790700117df37538e486dd6317ce22800000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781c2", @ANYRES8=r2], 0xfdef) (async) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x100001ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0xff}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) (async) close(r1) (async) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000180000003d030100000000009500f000000000007126000000000000bf67000000000000360602000fff07006706000020000000170200000ee60000bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad03000000000000720400000000000014000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800ea6553f304000000815dcf00c3eebc52267b042d19"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x94) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000900)={0x1b, 0x0, 0x0, 0x8, 0x0, r7, 0x4, '\x00', r8, 0xffffffffffffffff, 0x4, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0xe1b, 0x5deb5c85, 0x7, 0x4014, r5, 0x2, '\x00', r8, r0, 0x3, 0x1, 0x2, 0x7}, 0x50) (async, rerun: 64) close(0xffffffffffffffff) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) (async, rerun: 64) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (rerun: 64) close(r9) kernel console output (not intermixed with test programs): corrupt user memory! [ 315.846158][T11603] device wg2 left promiscuous mode [ 315.909715][T11603] device wg2 entered promiscuous mode [ 316.701543][T11636] device syzkaller0 entered promiscuous mode [ 319.306746][T11750] device veth0_vlan left promiscuous mode [ 319.322538][T11750] device veth0_vlan entered promiscuous mode [ 319.368906][T11753] device wg2 left promiscuous mode [ 319.375130][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 319.402807][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 319.410505][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 319.459268][T11761] syz.4.3353[11761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.459329][T11761] syz.4.3353[11761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.849549][T11782] device syzkaller0 entered promiscuous mode [ 322.828140][T11867] device macsec0 left promiscuous mode [ 322.842242][T11867] device veth1_macvtap entered promiscuous mode [ 322.849802][T11867] device macsec0 entered promiscuous mode [ 322.881074][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 323.051732][T11881] device syzkaller0 entered promiscuous mode [ 323.730206][T11906] Â: renamed from pim6reg1 [ 324.194676][T11924] device syzkaller0 entered promiscuous mode [ 327.460947][T12013] syz.4.3422[12013] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.461037][T12013] syz.4.3422[12013] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.541703][T12009] Ÿë: port 1(veth0_to_team) entered blocking state [ 327.597297][T12009] Ÿë: port 1(veth0_to_team) entered disabled state [ 327.604393][T12009] device veth0_to_team entered promiscuous mode [ 327.624094][T12012] device veth0_vlan left promiscuous mode [ 327.630449][T12012] device veth0_vlan entered promiscuous mode [ 327.639424][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 327.648916][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 327.656760][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 328.770868][T12072] device wg2 left promiscuous mode [ 329.322115][T12091] device sit0 left promiscuous mode [ 329.383072][T12100] device sit0 entered promiscuous mode [ 329.396894][T12097] syz.1.3447[12097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.400024][T12097] syz.1.3447[12097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.682485][T12111] device pim6reg1 entered promiscuous mode [ 330.578891][T12156] device pim6reg1 entered promiscuous mode [ 331.362570][T12183] device wg2 entered promiscuous mode [ 333.172806][ T8758] syzkaller0: tun_net_xmit 76 [ 333.181273][T12216] syzkaller0: create flow: hash 2535810235 index 1 [ 333.197057][ C1] syzkaller0: tun_net_xmit 76 [ 333.201990][ T8758] syzkaller0: tun_net_xmit 48 [ 333.295508][T12222] syzkaller0: delete flow: hash 2535810235 index 1 [ 335.039007][T12332] device sit0 entered promiscuous mode [ 335.519016][T12351] device sit0 entered promiscuous mode [ 335.669683][T12354] device pim6reg1 entered promiscuous mode [ 335.842270][T12362] device wg2 left promiscuous mode [ 338.165299][T12437] device macsec0 left promiscuous mode [ 338.257490][T12436] device veth1_macvtap entered promiscuous mode [ 338.326416][T12436] device macsec0 entered promiscuous mode [ 338.347944][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 338.555868][T12473] syz.4.3548[12473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.555960][T12473] syz.4.3548[12473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.671809][T12481] cgroup: fork rejected by pids controller in /syz3 [ 339.211571][T12527] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.218782][T12527] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.236889][T12527] device bridge_slave_0 entered promiscuous mode [ 339.244160][T12527] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.256061][T12527] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.263789][T12527] device bridge_slave_1 entered promiscuous mode [ 339.323497][T12527] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.330617][T12527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.337932][T12527] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.344973][T12527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.397115][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 339.431111][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 339.451154][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 339.489764][T12550] device wg2 entered promiscuous mode [ 339.537991][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 339.606005][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 339.638867][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 339.790824][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.800226][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.808089][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 339.886389][T12527] device veth0_vlan entered promiscuous mode [ 340.041438][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 340.051302][T12527] device veth1_macvtap entered promiscuous mode [ 340.101449][T12569] device pim6reg1 entered promiscuous mode [ 340.139869][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 340.220665][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 340.234011][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 340.635563][T12589] device wg2 entered promiscuous mode [ 340.645904][T12599] device syzkaller0 left promiscuous mode [ 340.902924][T12596] device syzkaller0 entered promiscuous mode [ 340.939276][T12589] device sit0 entered promiscuous mode [ 341.649044][T12626] device wg2 left promiscuous mode [ 341.788372][T12626] device wg2 entered promiscuous mode [ 342.107400][ T328] device veth0_to_team left promiscuous mode [ 342.114691][ T328] Ÿë: port 1(veth0_to_team) entered disabled state [ 342.144264][ T328] device veth1_macvtap left promiscuous mode [ 342.428899][T12659] device sit0 left promiscuous mode [ 342.487493][T12659] device sit0 entered promiscuous mode [ 343.137086][T12693] device veth1_macvtap left promiscuous mode [ 343.355585][T12694] device veth1_macvtap entered promiscuous mode [ 343.365767][T12694] device macsec0 entered promiscuous mode [ 343.943631][T12754] device pim6reg1 entered promiscuous mode [ 344.304728][T12757] device veth1_to_bond entered promiscuous mode [ 344.446451][T12769] syz.1.3633[12769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.451014][T12769] syz.1.3633[12769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.470385][T12773] syz.1.3633[12773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.586570][T12773] syz.1.3633[12773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.612196][T12775] device syzkaller0 entered promiscuous mode [ 344.979571][T12786] device wg2 left promiscuous mode [ 345.000980][T12786] device wg2 entered promiscuous mode [ 351.527983][T12953] device wg2 left promiscuous mode [ 352.156085][T12989] Â: renamed from pim6reg1 [ 353.209166][T13026] syz.3.3709[13026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.209228][T13026] syz.3.3709[13026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.226449][T13027] syz.3.3709[13027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.238422][T13027] syz.3.3709[13027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.243331][T13017] device pim6reg1 entered promiscuous mode [ 353.291305][T13025] device wg2 left promiscuous mode [ 354.566105][T13091] device syzkaller0 entered promiscuous mode [ 356.372550][T13147] device sit0 left promiscuous mode [ 357.076684][T13183] device wg2 entered promiscuous mode [ 357.290655][T13201] device syzkaller0 entered promiscuous mode [ 357.465319][T13201] device pim6reg1 entered promiscuous mode [ 358.208338][T13225] device syzkaller0 entered promiscuous mode [ 358.691967][T13259] syz.3.3771[13259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.692025][T13259] syz.3.3771[13259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 359.486492][T13290] device syzkaller0 entered promiscuous mode [ 359.548969][T13305] device pim6reg1 entered promiscuous mode [ 359.730942][T13318] device syzkaller0 entered promiscuous mode [ 359.924242][T13343] device wg2 left promiscuous mode [ 359.967218][T13342] device wg2 entered promiscuous mode [ 360.665631][T13362] device syzkaller0 entered promiscuous mode [ 360.915222][T13387] syz.1.3806[13387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.915283][T13387] syz.1.3806[13387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.942155][T13388] device syzkaller0 entered promiscuous mode [ 361.372638][T13405] syz.3.3811[13405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 361.372693][T13405] syz.3.3811[13405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.389877][T13442] device pim6reg1 entered promiscuous mode [ 362.981047][T13462] device syzkaller0 left promiscuous mode [ 363.054280][T13465] device syzkaller0 entered promiscuous mode [ 366.190768][T13507] device veth0_vlan left promiscuous mode [ 366.206148][T13507] device veth0_vlan entered promiscuous mode [ 366.245364][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 366.273149][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 366.285624][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 366.344807][T13503] device wg2 entered promiscuous mode [ 366.371487][T13512] device veth0_vlan left promiscuous mode [ 366.385534][T13512] device veth0_vlan entered promiscuous mode [ 366.432571][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 366.455863][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 366.481237][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 367.496978][T13610] device syzkaller0 entered promiscuous mode [ 368.749497][T13660] device veth1_macvtap left promiscuous mode [ 368.827861][T13660] device macsec0 entered promiscuous mode [ 368.935603][T13665] device pim6reg1 entered promiscuous mode [ 369.162540][T13674] syz.1.3886[13674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.162595][T13674] syz.1.3886[13674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.045655][T13704] device sit0 entered promiscuous mode [ 373.214718][T13838] device pim6reg1 entered promiscuous mode [ 373.222965][T13838] device syzkaller0 entered promiscuous mode [ 374.044416][T13871] syz.3.3944[13871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.044474][T13871] syz.3.3944[13871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.178709][T13921] syz.1.3962[13921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.237484][T13921] syz.1.3962[13921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.356110][T13935] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.386413][T13935] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.394019][T13935] device bridge_slave_0 entered promiscuous mode [ 376.401854][T13935] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.419759][T13935] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.429037][T13935] device bridge_slave_1 entered promiscuous mode [ 376.484315][T13960] device pim6reg1 entered promiscuous mode [ 376.961596][T13968] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.126934][T13968] device bridge_slave_1 left promiscuous mode [ 377.174869][T13968] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.233411][T13968] device bridge_slave_0 left promiscuous mode [ 377.259176][T13968] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.487898][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 377.505472][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 377.584726][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 377.597982][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 377.613703][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.620821][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.636839][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 377.645259][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 377.654320][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.661404][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 377.746785][T13976] device wg2 left promiscuous mode [ 377.753093][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 377.761492][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 377.769902][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 377.778558][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 377.787221][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 377.798182][ T9] device veth1_macvtap left promiscuous mode [ 377.804267][ T9] device veth0_vlan left promiscuous mode [ 377.893550][T13977] device wg2 entered promiscuous mode [ 377.982152][T13935] device veth0_vlan entered promiscuous mode [ 378.052935][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 378.082729][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 378.114564][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 378.124332][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 378.268775][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 378.278231][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 378.298794][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 378.307581][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 378.361972][T13935] device veth1_macvtap entered promiscuous mode [ 378.441499][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 378.449757][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 378.458190][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 378.527462][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 378.546110][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 379.977230][T14011] device sit0 entered promiscuous mode [ 380.033271][T14010] device sit0 left promiscuous mode [ 380.603292][T14031] device veth1_macvtap left promiscuous mode [ 380.624823][T14031] device macsec0 left promiscuous mode [ 380.796319][T14031] device veth1_macvtap entered promiscuous mode [ 380.837642][T14031] device macsec0 entered promiscuous mode [ 380.920405][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 384.300340][T14189] device macsec0 left promiscuous mode [ 384.444180][T14189] device veth1_macvtap entered promiscuous mode [ 384.482280][T14189] device macsec0 entered promiscuous mode [ 384.547990][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 385.594444][T14233] syz.1.4050[14233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.594526][T14233] syz.1.4050[14233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.825031][T14247] device veth1_macvtap left promiscuous mode [ 385.954236][T14247] device macsec0 left promiscuous mode [ 386.018188][T14254] device veth1_macvtap entered promiscuous mode [ 386.028081][T14254] device macsec0 entered promiscuous mode [ 386.200632][T14272] device syzkaller0 entered promiscuous mode [ 386.241252][T14285] device veth1_macvtap left promiscuous mode [ 386.248338][T14285] device macsec0 left promiscuous mode [ 386.306533][T14294] device veth1_macvtap entered promiscuous mode [ 386.316559][T14294] device macsec0 entered promiscuous mode [ 387.503874][T14371] FAULT_INJECTION: forcing a failure. [ 387.503874][T14371] name failslab, interval 1, probability 0, space 0, times 0 [ 387.516724][T14371] CPU: 1 PID: 14371 Comm: syz.2.4086 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 387.528119][T14371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 387.538210][T14371] Call Trace: [ 387.541526][T14371] __dump_stack+0x21/0x24 [ 387.545875][T14371] dump_stack_lvl+0x169/0x1d8 [ 387.550579][T14371] ? thaw_kernel_threads+0x220/0x220 [ 387.555894][T14371] ? show_regs_print_info+0x18/0x18 [ 387.561113][T14371] ? stack_trace_save+0x98/0xe0 [ 387.565992][T14371] ? stack_trace_snprint+0xf0/0xf0 [ 387.571218][T14371] dump_stack+0x15/0x1c [ 387.575389][T14371] should_fail+0x3c1/0x510 [ 387.579822][T14371] ? dup_task_struct+0x57/0xbd0 [ 387.584704][T14371] __should_failslab+0xa4/0xe0 [ 387.589505][T14371] should_failslab+0x9/0x20 [ 387.594038][T14371] kmem_cache_alloc+0x3d/0x2e0 [ 387.598829][T14371] ? __kasan_check_write+0x14/0x20 [ 387.603956][T14371] dup_task_struct+0x57/0xbd0 [ 387.608646][T14371] ? __kasan_check_write+0x14/0x20 [ 387.613773][T14371] ? recalc_sigpending+0x1ac/0x230 [ 387.618904][T14371] copy_process+0x5b2/0x32c0 [ 387.623506][T14371] ? memset+0x35/0x40 [ 387.627508][T14371] ? proc_fail_nth_read+0x210/0x210 [ 387.632723][T14371] ? __pidfd_prepare+0x150/0x150 [ 387.637669][T14371] ? rw_verify_area+0x1c0/0x360 [ 387.642535][T14371] ? vfs_write+0xac8/0xd60 [ 387.646956][T14371] ? __kasan_slab_free+0x11/0x20 [ 387.651912][T14371] kernel_clone+0x23f/0x940 [ 387.656423][T14371] ? kernel_write+0x3c0/0x3c0 [ 387.661125][T14371] ? create_io_thread+0x130/0x130 [ 387.666159][T14371] ? mutex_lock+0x8c/0xe0 [ 387.670496][T14371] __x64_sys_clone+0x176/0x1d0 [ 387.675269][T14371] ? __ia32_sys_vfork+0xf0/0xf0 [ 387.680134][T14371] ? ksys_write+0x1eb/0x240 [ 387.684753][T14371] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 387.690826][T14371] do_syscall_64+0x31/0x40 [ 387.695250][T14371] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 387.701148][T14371] RIP: 0033:0x7fcb3463e929 [ 387.705588][T14371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 387.725203][T14371] RSP: 002b:00007fcb32ca6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 387.733628][T14371] RAX: ffffffffffffffda RBX: 00007fcb34865fa0 RCX: 00007fcb3463e929 [ 387.741607][T14371] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 387.749584][T14371] RBP: 00007fcb32ca7090 R08: 0000000000000000 R09: 0000000000000000 [ 387.757557][T14371] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 387.765620][T14371] R13: 0000000000000000 R14: 00007fcb34865fa0 R15: 00007fff93c10d48 [ 388.136791][T14394] syz.4.4095[14394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.136851][T14394] syz.4.4095[14394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.206239][T14399] FAULT_INJECTION: forcing a failure. [ 388.206239][T14399] name failslab, interval 1, probability 0, space 0, times 0 [ 388.230722][T14399] CPU: 1 PID: 14399 Comm: syz.4.4097 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 388.242105][T14399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 388.252487][T14399] Call Trace: [ 388.255800][T14399] __dump_stack+0x21/0x24 [ 388.260248][T14399] dump_stack_lvl+0x169/0x1d8 [ 388.264952][T14399] ? show_regs_print_info+0x18/0x18 [ 388.270197][T14399] ? do_syscall_64+0x31/0x40 [ 388.274828][T14399] dump_stack+0x15/0x1c [ 388.279009][T14399] should_fail+0x3c1/0x510 [ 388.283457][T14399] ? __get_vm_area_node+0x113/0x450 [ 388.288684][T14399] __should_failslab+0xa4/0xe0 [ 388.293603][T14399] should_failslab+0x9/0x20 [ 388.298130][T14399] kmem_cache_alloc_trace+0x3a/0x2e0 [ 388.303424][T14399] __get_vm_area_node+0x113/0x450 [ 388.308459][T14399] __vmalloc_node_range+0xe0/0x780 [ 388.313578][T14399] ? copy_process+0x5b2/0x32c0 [ 388.318363][T14399] ? kmem_cache_alloc+0x165/0x2e0 [ 388.323407][T14399] dup_task_struct+0x40f/0xbd0 [ 388.328193][T14399] ? copy_process+0x5b2/0x32c0 [ 388.332977][T14399] ? __kasan_check_write+0x14/0x20 [ 388.338102][T14399] ? recalc_sigpending+0x1ac/0x230 [ 388.343221][T14399] copy_process+0x5b2/0x32c0 [ 388.347814][T14399] ? memset+0x35/0x40 [ 388.351940][T14399] ? proc_fail_nth_read+0x210/0x210 [ 388.357277][T14399] ? __pidfd_prepare+0x150/0x150 [ 388.362233][T14399] ? rw_verify_area+0x1c0/0x360 [ 388.367112][T14399] ? vfs_write+0xac8/0xd60 [ 388.371547][T14399] ? __kasan_slab_free+0x11/0x20 [ 388.376506][T14399] kernel_clone+0x23f/0x940 [ 388.381029][T14399] ? kernel_write+0x3c0/0x3c0 [ 388.385730][T14399] ? create_io_thread+0x130/0x130 [ 388.390774][T14399] ? mutex_lock+0x8c/0xe0 [ 388.395123][T14399] __x64_sys_clone+0x176/0x1d0 [ 388.399897][T14399] ? __ia32_sys_vfork+0xf0/0xf0 [ 388.404752][T14399] ? ksys_write+0x1eb/0x240 [ 388.409274][T14399] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 388.415463][T14399] do_syscall_64+0x31/0x40 [ 388.419905][T14399] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 388.425805][T14399] RIP: 0033:0x7f4c08a7a929 [ 388.430243][T14399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 388.450602][T14399] RSP: 002b:00007f4c070e2fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 388.459045][T14399] RAX: ffffffffffffffda RBX: 00007f4c08ca1fa0 RCX: 00007f4c08a7a929 [ 388.467140][T14399] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 388.475257][T14399] RBP: 00007f4c070e3090 R08: 0000000000000000 R09: 0000000000000000 [ 388.483246][T14399] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 388.491243][T14399] R13: 0000000000000000 R14: 00007f4c08ca1fa0 R15: 00007ffcf9579788 [ 388.499732][T14399] syz.4.4097: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 388.526177][T14399] CPU: 1 PID: 14399 Comm: syz.4.4097 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 388.537672][T14399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 388.547953][T14399] Call Trace: [ 388.551534][T14399] __dump_stack+0x21/0x24 [ 388.555860][T14399] dump_stack_lvl+0x169/0x1d8 [ 388.560554][T14399] ? show_regs_print_info+0x18/0x18 [ 388.565877][T14399] ? pr_cont_kernfs_name+0xe3/0xf0 [ 388.571206][T14399] dump_stack+0x15/0x1c [ 388.575374][T14399] warn_alloc+0x1b0/0x1d0 [ 388.579714][T14399] ? __get_vm_area_node+0x113/0x450 [ 388.584926][T14399] ? zone_watermark_ok_safe+0x250/0x250 [ 388.590478][T14399] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 388.596032][T14399] ? __get_vm_area_node+0x345/0x450 [ 388.601329][T14399] __vmalloc_node_range+0x27d/0x780 [ 388.606531][T14399] ? kmem_cache_alloc+0x165/0x2e0 [ 388.611557][T14399] dup_task_struct+0x40f/0xbd0 [ 388.616326][T14399] ? copy_process+0x5b2/0x32c0 [ 388.621088][T14399] ? __kasan_check_write+0x14/0x20 [ 388.626200][T14399] ? recalc_sigpending+0x1ac/0x230 [ 388.631333][T14399] copy_process+0x5b2/0x32c0 [ 388.635921][T14399] ? memset+0x35/0x40 [ 388.639909][T14399] ? proc_fail_nth_read+0x210/0x210 [ 388.645112][T14399] ? __pidfd_prepare+0x150/0x150 [ 388.650050][T14399] ? rw_verify_area+0x1c0/0x360 [ 388.654908][T14399] ? vfs_write+0xac8/0xd60 [ 388.659340][T14399] ? __kasan_slab_free+0x11/0x20 [ 388.664283][T14399] kernel_clone+0x23f/0x940 [ 388.668799][T14399] ? kernel_write+0x3c0/0x3c0 [ 388.673480][T14399] ? create_io_thread+0x130/0x130 [ 388.678504][T14399] ? mutex_lock+0x8c/0xe0 [ 388.682929][T14399] __x64_sys_clone+0x176/0x1d0 [ 388.687697][T14399] ? __ia32_sys_vfork+0xf0/0xf0 [ 388.692549][T14399] ? ksys_write+0x1eb/0x240 [ 388.697064][T14399] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 388.703168][T14399] do_syscall_64+0x31/0x40 [ 388.707681][T14399] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 388.713576][T14399] RIP: 0033:0x7f4c08a7a929 [ 388.717999][T14399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 388.737714][T14399] RSP: 002b:00007f4c070e2fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 388.746133][T14399] RAX: ffffffffffffffda RBX: 00007f4c08ca1fa0 RCX: 00007f4c08a7a929 [ 388.754111][T14399] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 388.762087][T14399] RBP: 00007f4c070e3090 R08: 0000000000000000 R09: 0000000000000000 [ 388.770145][T14399] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 388.778146][T14399] R13: 0000000000000000 R14: 00007f4c08ca1fa0 R15: 00007ffcf9579788 [ 388.788298][T14399] Mem-Info: [ 388.791969][T14399] active_anon:38 inactive_anon:7643 isolated_anon:0 [ 388.791969][T14399] active_file:23794 inactive_file:3533 isolated_file:0 [ 388.791969][T14399] unevictable:0 dirty:273 writeback:0 [ 388.791969][T14399] slab_reclaimable:7713 slab_unreclaimable:76489 [ 388.791969][T14399] mapped:29550 shmem:162 pagetables:666 bounce:0 [ 388.791969][T14399] free:1561907 free_pcp:925 free_cma:0 [ 388.829290][T14399] Node 0 active_anon:152kB inactive_anon:30572kB active_file:95176kB inactive_file:14132kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:118200kB dirty:1092kB writeback:0kB shmem:648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5760kB all_unreclaimable? no [ 388.859334][T14399] DMA32 free:2987448kB min:62668kB low:78332kB high:93996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2988824kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1376kB local_pcp:1376kB free_cma:0kB [ 388.888130][T14399] lowmem_reserve[]: 0 3941 3941 [ 388.899903][T14399] Normal free:3261052kB min:84784kB low:105980kB high:127176kB reserved_highatomic:0KB active_anon:152kB inactive_anon:30556kB active_file:95176kB inactive_file:14132kB unevictable:0kB writepending:1100kB present:5242880kB managed:4036368kB mlocked:0kB pagetables:2692kB bounce:0kB free_pcp:2728kB local_pcp:1476kB free_cma:0kB [ 388.930898][T14399] lowmem_reserve[]: 0 0 0 [ 388.935303][T14399] DMA32: 6*4kB (UM) 2*8kB (M) 3*16kB (M) 7*32kB (UM) 8*64kB (UM) 5*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 725*4096kB (M) = 2987448kB [ 388.958065][T14399] Normal: 384*4kB (UME) 1027*8kB (UME) 1152*16kB (UME) 866*32kB (UME) 430*64kB (UME) 243*128kB (UME) 137*256kB (UME) 58*512kB (UM) 34*1024kB (UME) 12*2048kB (UM) 738*4096kB (UM) = 3261528kB [ 388.979851][T14399] 27489 total pagecache pages [ 388.984693][T14399] 0 pages in swap cache [ 389.042208][T14399] Swap cache stats: add 0, delete 0, find 0/0 [ 389.052051][T14399] Free swap = 124996kB [ 389.056667][T14399] Total swap = 124996kB [ 389.061351][T14399] 2097051 pages RAM [ 389.065233][T14399] 0 pages HighMem/MovableOnly [ 389.070248][T14399] 340753 pages reserved [ 389.074568][T14399] 0 pages cma reserved [ 389.155809][T14418] device pim6reg1 entered promiscuous mode [ 389.287021][T14421] device veth1_macvtap left promiscuous mode [ 389.303115][T14421] device macsec0 left promiscuous mode [ 389.438919][T14421] device veth1_macvtap entered promiscuous mode [ 389.476397][T14421] device macsec0 entered promiscuous mode [ 391.151547][T14473] device syzkaller0 entered promiscuous mode [ 391.248171][T14473] device pim6reg1 entered promiscuous mode [ 391.559768][T14494] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.302373][T14524] device pim6reg1 entered promiscuous mode [ 392.827329][T14552] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.984211][T14556] device bridge_slave_1 left promiscuous mode [ 392.990452][T14556] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.013509][T14556] device bridge_slave_0 left promiscuous mode [ 393.023504][T14556] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.739098][T14616] syz.1.4163[14616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.739162][T14616] syz.1.4163[14616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.889917][T14616] device pim6reg1 entered promiscuous mode [ 395.377588][T14681] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.388527][T14681] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.446113][T14696] device bridge_slave_1 left promiscuous mode [ 395.452476][T14696] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.460224][T14696] device bridge_slave_0 left promiscuous mode [ 395.466440][T14696] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.516489][T14699] pim6reg0: tun_chr_ioctl cmd 3221517374 [ 395.540554][T14692] pim6reg0: tun_chr_ioctl cmd 35108 [ 395.704349][T14707] device veth0_vlan left promiscuous mode [ 395.779117][T14707] device veth0_vlan entered promiscuous mode [ 395.905039][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 395.934116][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 395.974110][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 397.970459][T14787] device syzkaller0 entered promiscuous mode [ 398.533680][T14829] GPL: port 1(erspan0) entered blocking state [ 398.557525][T14829] GPL: port 1(erspan0) entered disabled state [ 398.564173][T14829] device erspan0 entered promiscuous mode [ 398.601018][T14830] device pim6reg1 entered promiscuous mode [ 398.608565][T14822] GPL: port 1(erspan0) entered blocking state [ 398.614735][T14822] GPL: port 1(erspan0) entered forwarding state [ 398.693952][T14834] device wg2 left promiscuous mode [ 398.708772][T14835] device wg2 entered promiscuous mode [ 398.739923][T14839] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 398.746077][T14839] syzkaller0: linktype set to 804 [ 398.851926][T14838] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 398.860282][T14838] syzkaller0: linktype set to 804 [ 398.969039][T14849] device pim6reg1 entered promiscuous mode [ 400.367398][T14912] device wg2 left promiscuous mode [ 401.831610][T14993] device sit0 entered promiscuous mode [ 403.034786][T15072] FAULT_INJECTION: forcing a failure. [ 403.034786][T15072] name failslab, interval 1, probability 0, space 0, times 0 [ 403.047702][T15072] CPU: 1 PID: 15072 Comm: syz.1.4292 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 403.059076][T15072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 403.069138][T15072] Call Trace: [ 403.072437][T15072] __dump_stack+0x21/0x24 [ 403.076765][T15072] dump_stack_lvl+0x169/0x1d8 [ 403.081441][T15072] ? show_regs_print_info+0x18/0x18 [ 403.086637][T15072] ? __kasan_slab_free+0x11/0x20 [ 403.091567][T15072] ? slab_free_freelist_hook+0xc5/0x190 [ 403.097109][T15072] dump_stack+0x15/0x1c [ 403.101261][T15072] should_fail+0x3c1/0x510 [ 403.105675][T15072] ? kobject_uevent_env+0x272/0x700 [ 403.110880][T15072] __should_failslab+0xa4/0xe0 [ 403.115638][T15072] should_failslab+0x9/0x20 [ 403.120147][T15072] kmem_cache_alloc_trace+0x3a/0x2e0 [ 403.125429][T15072] ? kernfs_put+0x449/0x480 [ 403.129931][T15072] kobject_uevent_env+0x272/0x700 [ 403.134953][T15072] kobject_uevent+0x1d/0x30 [ 403.139456][T15072] __kobject_del+0xd7/0x2f0 [ 403.143953][T15072] kobject_put+0x1db/0x270 [ 403.148367][T15072] netdev_queue_update_kobjects+0x326/0x390 [ 403.154260][T15072] netif_set_real_num_tx_queues+0x15d/0x7c0 [ 403.160154][T15072] __tun_detach+0xb31/0x1450 [ 403.164743][T15072] __tun_chr_ioctl+0xaad/0x1cd0 [ 403.169591][T15072] ? mutex_trylock+0xa0/0xa0 [ 403.174175][T15072] ? tun_flow_create+0x320/0x320 [ 403.179212][T15072] ? __fget_files+0x2c4/0x320 [ 403.183910][T15072] tun_chr_ioctl+0x2a/0x40 [ 403.188328][T15072] ? tun_chr_poll+0x6b0/0x6b0 [ 403.193001][T15072] __se_sys_ioctl+0x121/0x1a0 [ 403.197828][T15072] __x64_sys_ioctl+0x7b/0x90 [ 403.202423][T15072] do_syscall_64+0x31/0x40 [ 403.206848][T15072] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 403.212746][T15072] RIP: 0033:0x7f1418e1a929 [ 403.217167][T15072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 403.236774][T15072] RSP: 002b:00007f1417483038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 403.245186][T15072] RAX: ffffffffffffffda RBX: 00007f1419041fa0 RCX: 00007f1418e1a929 [ 403.253154][T15072] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000007 [ 403.261120][T15072] RBP: 00007f1417483090 R08: 0000000000000000 R09: 0000000000000000 [ 403.269084][T15072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 403.277241][T15072] R13: 0000000000000000 R14: 00007f1419041fa0 R15: 00007ffdfcc65d68 [ 403.576898][ T94] udevd[94]: worker [10126] terminated by signal 33 (Unknown signal 33) [ 403.638200][ T94] udevd[94]: worker [10126] failed while handling '/devices/virtual/block/loop3' [ 403.679724][ T94] udevd[94]: worker [10127] terminated by signal 33 (Unknown signal 33) [ 403.703783][ T94] udevd[94]: worker [10127] failed while handling '/devices/virtual/block/loop4' [ 403.844043][T15139] FAULT_INJECTION: forcing a failure. [ 403.844043][T15139] name failslab, interval 1, probability 0, space 0, times 0 [ 403.857477][T15139] CPU: 0 PID: 15139 Comm: syz.2.4312 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 403.868863][T15139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 403.878918][T15139] Call Trace: [ 403.882213][T15139] __dump_stack+0x21/0x24 [ 403.886548][T15139] dump_stack_lvl+0x169/0x1d8 [ 403.891224][T15139] ? thaw_kernel_threads+0x220/0x220 [ 403.896503][T15139] ? show_regs_print_info+0x18/0x18 [ 403.901702][T15139] dump_stack+0x15/0x1c [ 403.905849][T15139] should_fail+0x3c1/0x510 [ 403.910263][T15139] ? kobject_get_path+0xbf/0x1f0 [ 403.915199][T15139] __should_failslab+0xa4/0xe0 [ 403.919959][T15139] should_failslab+0x9/0x20 [ 403.924456][T15139] __kmalloc+0x60/0x330 [ 403.928607][T15139] kobject_get_path+0xbf/0x1f0 [ 403.933367][T15139] kobject_uevent_env+0x28b/0x700 [ 403.938388][T15139] kobject_uevent+0x1d/0x30 [ 403.942887][T15139] __kobject_del+0xd7/0x2f0 [ 403.947385][T15139] kobject_put+0x1db/0x270 [ 403.951797][T15139] netdev_queue_update_kobjects+0x326/0x390 [ 403.957691][T15139] netif_set_real_num_tx_queues+0x15d/0x7c0 [ 403.963582][T15139] __tun_detach+0xb31/0x1450 [ 403.968172][T15139] __tun_chr_ioctl+0xaad/0x1cd0 [ 403.973014][T15139] ? mutex_trylock+0xa0/0xa0 [ 403.977598][T15139] ? tun_flow_create+0x320/0x320 [ 403.982533][T15139] ? __fget_files+0x2c4/0x320 [ 403.987212][T15139] tun_chr_ioctl+0x2a/0x40 [ 403.991624][T15139] ? tun_chr_poll+0x6b0/0x6b0 [ 403.996305][T15139] __se_sys_ioctl+0x121/0x1a0 [ 404.000978][T15139] __x64_sys_ioctl+0x7b/0x90 [ 404.005560][T15139] do_syscall_64+0x31/0x40 [ 404.009975][T15139] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 404.015861][T15139] RIP: 0033:0x7fcb3463e929 [ 404.020273][T15139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 404.039958][T15139] RSP: 002b:00007fcb32ca7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 404.048364][T15139] RAX: ffffffffffffffda RBX: 00007fcb34865fa0 RCX: 00007fcb3463e929 [ 404.056331][T15139] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000007 [ 404.064299][T15139] RBP: 00007fcb32ca7090 R08: 0000000000000000 R09: 0000000000000000 [ 404.072268][T15139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 404.080233][T15139] R13: 0000000000000000 R14: 00007fcb34865fa0 R15: 00007fff93c10d48 [ 405.454010][T15189] FAULT_INJECTION: forcing a failure. [ 405.454010][T15189] name failslab, interval 1, probability 0, space 0, times 0 [ 405.491174][T15189] CPU: 1 PID: 15189 Comm: syz.0.4325 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 405.502629][T15189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 405.512699][T15189] Call Trace: [ 405.516015][T15189] __dump_stack+0x21/0x24 [ 405.520373][T15189] dump_stack_lvl+0x169/0x1d8 [ 405.525080][T15189] ? show_regs_print_info+0x18/0x18 [ 405.530290][T15189] ? format_decode+0xbdc/0x1520 [ 405.535159][T15189] dump_stack+0x15/0x1c [ 405.539328][T15189] should_fail+0x3c1/0x510 [ 405.543754][T15189] ? __alloc_skb+0x9e/0x520 [ 405.548279][T15189] __should_failslab+0xa4/0xe0 [ 405.553059][T15189] should_failslab+0x9/0x20 [ 405.557574][T15189] kmem_cache_alloc+0x3d/0x2e0 [ 405.562347][T15189] ? add_uevent_var+0x27e/0x430 [ 405.567213][T15189] __alloc_skb+0x9e/0x520 [ 405.571556][T15189] ? mutex_lock+0x8c/0xe0 [ 405.575893][T15189] alloc_uevent_skb+0x85/0x240 [ 405.580659][T15189] ? netdev_queue_release+0x90/0x90 [ 405.585849][T15189] kobject_uevent_net_broadcast+0x1a6/0x5a0 [ 405.591747][T15189] kobject_uevent_env+0x52e/0x700 [ 405.596777][T15189] kobject_uevent+0x1d/0x30 [ 405.601271][T15189] __kobject_del+0xd7/0x2f0 [ 405.605767][T15189] kobject_put+0x1db/0x270 [ 405.610181][T15189] netdev_queue_update_kobjects+0x326/0x390 [ 405.616073][T15189] netif_set_real_num_tx_queues+0x15d/0x7c0 [ 405.621964][T15189] __tun_detach+0xb31/0x1450 [ 405.626581][T15189] __tun_chr_ioctl+0xaad/0x1cd0 [ 405.631423][T15189] ? mutex_trylock+0xa0/0xa0 [ 405.636006][T15189] ? tun_flow_create+0x320/0x320 [ 405.640941][T15189] ? __fget_files+0x2c4/0x320 [ 405.645612][T15189] tun_chr_ioctl+0x2a/0x40 [ 405.650020][T15189] ? tun_chr_poll+0x6b0/0x6b0 [ 405.654692][T15189] __se_sys_ioctl+0x121/0x1a0 [ 405.659365][T15189] __x64_sys_ioctl+0x7b/0x90 [ 405.663948][T15189] do_syscall_64+0x31/0x40 [ 405.668361][T15189] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 405.674242][T15189] RIP: 0033:0x7f501333c929 [ 405.678649][T15189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.698257][T15189] RSP: 002b:00007f50119a5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 405.706663][T15189] RAX: ffffffffffffffda RBX: 00007f5013563fa0 RCX: 00007f501333c929 [ 405.714626][T15189] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000007 [ 405.722599][T15189] RBP: 00007f50119a5090 R08: 0000000000000000 R09: 0000000000000000 [ 405.730564][T15189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 405.738526][T15189] R13: 0000000000000000 R14: 00007f5013563fa0 R15: 00007ffc1bc86378 [ 405.877794][T15208] device pim6reg1 entered promiscuous mode [ 406.579839][T15242] syz.4.4339[15242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.579929][T15242] syz.4.4339[15242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.461945][T15308] FAULT_INJECTION: forcing a failure. [ 408.461945][T15308] name failslab, interval 1, probability 0, space 0, times 0 [ 408.666272][T15308] CPU: 1 PID: 15308 Comm: syz.3.4358 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 408.677754][T15308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 408.687824][T15308] Call Trace: [ 408.691133][T15308] __dump_stack+0x21/0x24 [ 408.695482][T15308] dump_stack_lvl+0x169/0x1d8 [ 408.700178][T15308] ? show_regs_print_info+0x18/0x18 [ 408.705394][T15308] ? kernfs_put+0x310/0x480 [ 408.709926][T15308] ? __bpf_trace_kmem_free+0x6f/0x90 [ 408.715238][T15308] ? kernfs_put+0x310/0x480 [ 408.719757][T15308] dump_stack+0x15/0x1c [ 408.723928][T15308] should_fail+0x3c1/0x510 [ 408.728360][T15308] ? kobject_uevent_env+0x272/0x700 [ 408.733575][T15308] __should_failslab+0xa4/0xe0 [ 408.738362][T15308] should_failslab+0x9/0x20 [ 408.742889][T15308] kmem_cache_alloc_trace+0x3a/0x2e0 [ 408.748198][T15308] ? kernfs_put+0x449/0x480 [ 408.752726][T15308] kobject_uevent_env+0x272/0x700 [ 408.757775][T15308] kobject_uevent+0x1d/0x30 [ 408.762305][T15308] __kobject_del+0xd7/0x2f0 [ 408.766819][T15308] kobject_put+0x1db/0x270 [ 408.771265][T15308] net_rx_queue_update_kobjects+0x3b5/0x420 [ 408.777155][T15308] ? netif_set_real_num_tx_queues+0x5e0/0x7c0 [ 408.783233][T15308] netif_set_real_num_rx_queues+0x107/0x1f0 [ 408.789120][T15308] __tun_detach+0xb67/0x1450 [ 408.793705][T15308] __tun_chr_ioctl+0xaad/0x1cd0 [ 408.798548][T15308] ? mutex_trylock+0xa0/0xa0 [ 408.803132][T15308] ? tun_flow_create+0x320/0x320 [ 408.808168][T15308] ? __fget_files+0x2c4/0x320 [ 408.812839][T15308] tun_chr_ioctl+0x2a/0x40 [ 408.817253][T15308] ? tun_chr_poll+0x6b0/0x6b0 [ 408.821923][T15308] __se_sys_ioctl+0x121/0x1a0 [ 408.826594][T15308] __x64_sys_ioctl+0x7b/0x90 [ 408.831175][T15308] do_syscall_64+0x31/0x40 [ 408.835586][T15308] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 408.841471][T15308] RIP: 0033:0x7fe94ad2b929 [ 408.845901][T15308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.865502][T15308] RSP: 002b:00007fe949394038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 408.873910][T15308] RAX: ffffffffffffffda RBX: 00007fe94af52fa0 RCX: 00007fe94ad2b929 [ 408.881878][T15308] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000007 [ 408.889962][T15308] RBP: 00007fe949394090 R08: 0000000000000000 R09: 0000000000000000 [ 408.898024][T15308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.906004][T15308] R13: 0000000000000000 R14: 00007fe94af52fa0 R15: 00007fff79291238 [ 410.341131][T15358] FAULT_INJECTION: forcing a failure. [ 410.341131][T15358] name failslab, interval 1, probability 0, space 0, times 0 [ 410.353903][T15358] CPU: 1 PID: 15358 Comm: syz.1.4375 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 410.365284][T15358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 410.375353][T15358] Call Trace: [ 410.378663][T15358] __dump_stack+0x21/0x24 [ 410.383001][T15358] dump_stack_lvl+0x169/0x1d8 [ 410.387687][T15358] ? thaw_kernel_threads+0x220/0x220 [ 410.392982][T15358] ? show_regs_print_info+0x18/0x18 [ 410.398194][T15358] dump_stack+0x15/0x1c [ 410.402367][T15358] should_fail+0x3c1/0x510 [ 410.406888][T15358] ? kobject_get_path+0xbf/0x1f0 [ 410.411827][T15358] __should_failslab+0xa4/0xe0 [ 410.416585][T15358] should_failslab+0x9/0x20 [ 410.421191][T15358] __kmalloc+0x60/0x330 [ 410.425351][T15358] kobject_get_path+0xbf/0x1f0 [ 410.430129][T15358] kobject_uevent_env+0x28b/0x700 [ 410.435188][T15358] kobject_uevent+0x1d/0x30 [ 410.439692][T15358] __kobject_del+0xd7/0x2f0 [ 410.444187][T15358] kobject_put+0x1db/0x270 [ 410.448601][T15358] net_rx_queue_update_kobjects+0x3b5/0x420 [ 410.454482][T15358] ? netif_set_real_num_tx_queues+0x5e0/0x7c0 [ 410.460546][T15358] netif_set_real_num_rx_queues+0x107/0x1f0 [ 410.466531][T15358] __tun_detach+0xb67/0x1450 [ 410.471223][T15358] __tun_chr_ioctl+0xaad/0x1cd0 [ 410.476077][T15358] ? mutex_trylock+0xa0/0xa0 [ 410.480774][T15358] ? tun_flow_create+0x320/0x320 [ 410.485704][T15358] ? __fget_files+0x2c4/0x320 [ 410.490380][T15358] tun_chr_ioctl+0x2a/0x40 [ 410.494804][T15358] ? tun_chr_poll+0x6b0/0x6b0 [ 410.499482][T15358] __se_sys_ioctl+0x121/0x1a0 [ 410.504152][T15358] __x64_sys_ioctl+0x7b/0x90 [ 410.508744][T15358] do_syscall_64+0x31/0x40 [ 410.513167][T15358] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 410.519056][T15358] RIP: 0033:0x7f1418e1a929 [ 410.523463][T15358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 410.543233][T15358] RSP: 002b:00007f1417483038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 410.551647][T15358] RAX: ffffffffffffffda RBX: 00007f1419041fa0 RCX: 00007f1418e1a929 [ 410.559639][T15358] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000007 [ 410.567602][T15358] RBP: 00007f1417483090 R08: 0000000000000000 R09: 0000000000000000 [ 410.575731][T15358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 410.583703][T15358] R13: 0000000000000000 R14: 00007f1419041fa0 R15: 00007ffdfcc65d68 [ 410.951039][T15374] Ÿë: port 1(veth0_vlan) entered blocking state [ 410.959803][T15374] Ÿë: port 1(veth0_vlan) entered disabled state [ 412.428387][T15413] FAULT_INJECTION: forcing a failure. [ 412.428387][T15413] name failslab, interval 1, probability 0, space 0, times 0 [ 412.498126][T15413] CPU: 1 PID: 15413 Comm: syz.1.4391 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 412.509653][T15413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 412.519709][T15413] Call Trace: [ 412.523021][T15413] __dump_stack+0x21/0x24 [ 412.527362][T15413] dump_stack_lvl+0x169/0x1d8 [ 412.532035][T15413] ? show_regs_print_info+0x18/0x18 [ 412.537228][T15413] ? format_decode+0xbdc/0x1520 [ 412.542086][T15413] dump_stack+0x15/0x1c [ 412.546229][T15413] should_fail+0x3c1/0x510 [ 412.550637][T15413] ? __alloc_skb+0x9e/0x520 [ 412.555142][T15413] __should_failslab+0xa4/0xe0 [ 412.559919][T15413] should_failslab+0x9/0x20 [ 412.564416][T15413] kmem_cache_alloc+0x3d/0x2e0 [ 412.569174][T15413] ? add_uevent_var+0x27e/0x430 [ 412.574019][T15413] __alloc_skb+0x9e/0x520 [ 412.578365][T15413] ? mutex_lock+0x8c/0xe0 [ 412.582686][T15413] alloc_uevent_skb+0x85/0x240 [ 412.587464][T15413] ? rx_queue_release+0x140/0x140 [ 412.592478][T15413] kobject_uevent_net_broadcast+0x1a6/0x5a0 [ 412.598365][T15413] kobject_uevent_env+0x52e/0x700 [ 412.603400][T15413] kobject_uevent+0x1d/0x30 [ 412.607899][T15413] __kobject_del+0xd7/0x2f0 [ 412.612394][T15413] kobject_put+0x1db/0x270 [ 412.616799][T15413] net_rx_queue_update_kobjects+0x3b5/0x420 [ 412.622690][T15413] ? netif_set_real_num_tx_queues+0x5e0/0x7c0 [ 412.628751][T15413] netif_set_real_num_rx_queues+0x107/0x1f0 [ 412.634640][T15413] __tun_detach+0xb67/0x1450 [ 412.639237][T15413] __tun_chr_ioctl+0xaad/0x1cd0 [ 412.644080][T15413] ? mutex_trylock+0xa0/0xa0 [ 412.648662][T15413] ? tun_flow_create+0x320/0x320 [ 412.653595][T15413] ? __fget_files+0x2c4/0x320 [ 412.658264][T15413] tun_chr_ioctl+0x2a/0x40 [ 412.662669][T15413] ? tun_chr_poll+0x6b0/0x6b0 [ 412.667362][T15413] __se_sys_ioctl+0x121/0x1a0 [ 412.672042][T15413] __x64_sys_ioctl+0x7b/0x90 [ 412.676631][T15413] do_syscall_64+0x31/0x40 [ 412.681042][T15413] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 412.686950][T15413] RIP: 0033:0x7f1418e1a929 [ 412.691366][T15413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 412.710964][T15413] RSP: 002b:00007f1417483038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 412.719374][T15413] RAX: ffffffffffffffda RBX: 00007f1419041fa0 RCX: 00007f1418e1a929 [ 412.727338][T15413] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000006 [ 412.735326][T15413] RBP: 00007f1417483090 R08: 0000000000000000 R09: 0000000000000000 [ 412.743378][T15413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 412.751342][T15413] R13: 0000000000000000 R14: 00007f1419041fa0 R15: 00007ffdfcc65d68 [ 413.717581][T15475] FAULT_INJECTION: forcing a failure. [ 413.717581][T15475] name failslab, interval 1, probability 0, space 0, times 0 [ 413.731294][T15475] CPU: 1 PID: 15475 Comm: syz.1.4410 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 413.742677][T15475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 413.752758][T15475] Call Trace: [ 413.756080][T15475] __dump_stack+0x21/0x24 [ 413.760426][T15475] dump_stack_lvl+0x169/0x1d8 [ 413.765120][T15475] ? thaw_kernel_threads+0x220/0x220 [ 413.770513][T15475] ? show_regs_print_info+0x18/0x18 [ 413.775730][T15475] dump_stack+0x15/0x1c [ 413.779905][T15475] should_fail+0x3c1/0x510 [ 413.784342][T15475] ? alloc_uevent_skb+0x85/0x240 [ 413.789308][T15475] __should_failslab+0xa4/0xe0 [ 413.794098][T15475] should_failslab+0x9/0x20 [ 413.798706][T15475] __kmalloc_track_caller+0x5f/0x320 [ 413.804006][T15475] ? kmem_cache_alloc+0x165/0x2e0 [ 413.809026][T15475] ? __alloc_skb+0x9e/0x520 [ 413.813529][T15475] ? alloc_uevent_skb+0x85/0x240 [ 413.818455][T15475] __alloc_skb+0xdc/0x520 [ 413.822779][T15475] ? mutex_lock+0x8c/0xe0 [ 413.827107][T15475] alloc_uevent_skb+0x85/0x240 [ 413.831868][T15475] ? rx_queue_release+0x140/0x140 [ 413.836884][T15475] kobject_uevent_net_broadcast+0x1a6/0x5a0 [ 413.842778][T15475] kobject_uevent_env+0x52e/0x700 [ 413.847813][T15475] kobject_uevent+0x1d/0x30 [ 413.852314][T15475] __kobject_del+0xd7/0x2f0 [ 413.856818][T15475] kobject_put+0x1db/0x270 [ 413.861236][T15475] net_rx_queue_update_kobjects+0x3b5/0x420 [ 413.867122][T15475] ? netif_set_real_num_tx_queues+0x5e0/0x7c0 [ 413.873183][T15475] netif_set_real_num_rx_queues+0x107/0x1f0 [ 413.879163][T15475] __tun_detach+0xb67/0x1450 [ 413.883752][T15475] __tun_chr_ioctl+0xaad/0x1cd0 [ 413.888599][T15475] ? mutex_trylock+0xa0/0xa0 [ 413.893181][T15475] ? tun_flow_create+0x320/0x320 [ 413.898116][T15475] ? __fget_files+0x2c4/0x320 [ 413.902791][T15475] tun_chr_ioctl+0x2a/0x40 [ 413.907202][T15475] ? tun_chr_poll+0x6b0/0x6b0 [ 413.911873][T15475] __se_sys_ioctl+0x121/0x1a0 [ 413.916542][T15475] __x64_sys_ioctl+0x7b/0x90 [ 413.921124][T15475] do_syscall_64+0x31/0x40 [ 413.925541][T15475] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 413.931426][T15475] RIP: 0033:0x7f1418e1a929 [ 413.935839][T15475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 413.955435][T15475] RSP: 002b:00007f1417483038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 413.963844][T15475] RAX: ffffffffffffffda RBX: 00007f1419041fa0 RCX: 00007f1418e1a929 [ 413.971830][T15475] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000007 [ 413.979799][T15475] RBP: 00007f1417483090 R08: 0000000000000000 R09: 0000000000000000 [ 413.987763][T15475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.995733][T15475] R13: 0000000000000000 R14: 00007f1419041fa0 R15: 00007ffdfcc65d68 [ 414.648234][T15503] device syzkaller0 entered promiscuous mode [ 415.565623][T15528] FAULT_INJECTION: forcing a failure. [ 415.565623][T15528] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 415.616393][T15528] CPU: 1 PID: 15528 Comm: syz.4.4424 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 415.627815][T15528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 415.637882][T15528] Call Trace: [ 415.641205][T15528] __dump_stack+0x21/0x24 [ 415.645557][T15528] dump_stack_lvl+0x169/0x1d8 [ 415.650336][T15528] ? thaw_kernel_threads+0x220/0x220 [ 415.655686][T15528] ? vsnprintf+0x1871/0x1960 [ 415.660440][T15528] ? show_regs_print_info+0x18/0x18 [ 415.665661][T15528] dump_stack+0x15/0x1c [ 415.669835][T15528] should_fail+0x3c1/0x510 [ 415.674270][T15528] should_fail_usercopy+0x1a/0x20 [ 415.679310][T15528] _copy_to_user+0x20/0x90 [ 415.683740][T15528] simple_read_from_buffer+0xe9/0x160 [ 415.689135][T15528] proc_fail_nth_read+0x19a/0x210 [ 415.694182][T15528] ? proc_fault_inject_write+0x2f0/0x2f0 [ 415.699836][T15528] ? rw_verify_area+0x1c0/0x360 [ 415.704795][T15528] ? proc_fault_inject_write+0x2f0/0x2f0 [ 415.710463][T15528] vfs_read+0x1fe/0xa10 [ 415.714633][T15528] ? kernel_read+0x70/0x70 [ 415.719061][T15528] ? __kasan_check_write+0x14/0x20 [ 415.724179][T15528] ? mutex_lock+0x8c/0xe0 [ 415.728551][T15528] ? mutex_trylock+0xa0/0xa0 [ 415.733155][T15528] ? __fget_files+0x2c4/0x320 [ 415.737850][T15528] ? __fdget_pos+0x2d2/0x380 [ 415.742449][T15528] ? ksys_read+0x71/0x240 [ 415.746796][T15528] ksys_read+0x140/0x240 [ 415.751050][T15528] ? vfs_write+0xd60/0xd60 [ 415.755480][T15528] ? fpu__clear_all+0x20/0x20 [ 415.760168][T15528] ? __se_sys_ioctl+0x184/0x1a0 [ 415.765049][T15528] __x64_sys_read+0x7b/0x90 [ 415.769628][T15528] do_syscall_64+0x31/0x40 [ 415.774062][T15528] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 415.779968][T15528] RIP: 0033:0x7f4c08a7933c [ 415.784397][T15528] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 415.804023][T15528] RSP: 002b:00007f4c070e3030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 415.812456][T15528] RAX: ffffffffffffffda RBX: 00007f4c08ca1fa0 RCX: 00007f4c08a7933c [ 415.820453][T15528] RDX: 000000000000000f RSI: 00007f4c070e30a0 RDI: 0000000000000008 [ 415.828450][T15528] RBP: 00007f4c070e3090 R08: 0000000000000000 R09: 0000000000000000 [ 415.836439][T15528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 415.844433][T15528] R13: 0000000000000000 R14: 00007f4c08ca1fa0 R15: 00007ffcf9579788 [ 415.873285][T15526] device wg2 left promiscuous mode [ 416.116727][T15535] device syzkaller0 entered promiscuous mode [ 416.664161][T15546] device syzkaller0 entered promiscuous mode [ 417.030617][T15564] device syzkaller0 entered promiscuous mode [ 420.772733][T15731] Ÿë: port 1(veth0_vlan) entered blocking state [ 420.781689][T15731] Ÿë: port 1(veth0_vlan) entered disabled state [ 422.687866][T15799] device sit0 left promiscuous mode [ 422.807752][T15800] device sit0 entered promiscuous mode [ 426.013040][T15879] device syzkaller0 entered promiscuous mode [ 426.133299][T15885] device pim6reg1 entered promiscuous mode [ 426.449884][T15904] device pim6reg1 entered promiscuous mode [ 426.667000][T15900] device syzkaller0 entered promiscuous mode [ 427.992449][T15942] device syzkaller0 entered promiscuous mode [ 428.505188][T15953] device sit0 entered promiscuous mode [ 429.374388][T15997] device sit0 left promiscuous mode [ 429.568464][T15997] device sit0 entered promiscuous mode [ 431.143182][T16061] device syzkaller0 entered promiscuous mode [ 431.371537][ T24] audit: type=1400 audit(1751728335.060:173): avc: denied { create } for pid=16071 comm="syz.0.4572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 442.572575][T16108] device sit0 left promiscuous mode [ 442.693692][T16111] device sit0 entered promiscuous mode [ 443.147171][T16119] device syzkaller0 entered promiscuous mode [ 443.330393][T16136] device pim6reg1 entered promiscuous mode [ 443.494298][T16158] device sit0 left promiscuous mode [ 443.581565][T16158] device sit0 entered promiscuous mode [ 443.626678][T16164] device pim6reg1 entered promiscuous mode [ 444.310798][T16196] syz.3.4608[16196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.310859][T16196] syz.3.4608[16196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.217491][T16254] Â: renamed from pim6reg1 [ 446.611289][T16270] device pim6reg1 entered promiscuous mode [ 449.665208][T16358] device syzkaller0 entered promiscuous mode [ 450.406376][ C1] syzkaller0: tun_net_xmit 90 [ 450.467695][ T6037] syzkaller0: tun_net_xmit 86 [ 451.333260][T16426] device sit0 left promiscuous mode [ 451.382078][T16427] device sit0 entered promiscuous mode [ 451.863685][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 451.889427][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 451.935582][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 452.607079][T16466] device sit0 left promiscuous mode [ 452.884392][T16472] device sit0 entered promiscuous mode [ 468.787424][T16570] device pim6reg1 entered promiscuous mode [ 469.210865][T16585] device wg2 entered promiscuous mode [ 470.359243][T16622] device wg2 entered promiscuous mode [ 473.154644][T16710] Â: renamed from pim6reg1 [ 474.471539][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 474.480378][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 474.488334][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 475.367894][T16759] device wg2 left promiscuous mode [ 476.249608][T16799] device sit0 left promiscuous mode [ 476.638003][T16821] device syzkaller0 entered promiscuous mode [ 477.044311][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 477.064633][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 477.072586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 478.189105][T16929] device bridge_slave_0 entered promiscuous mode [ 479.308436][T16965] device wg2 entered promiscuous mode [ 479.341092][T16972] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.348408][T16972] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.668624][T16967] device syzkaller0 entered promiscuous mode [ 479.736874][T16965] device bridge_slave_1 left promiscuous mode [ 479.745576][T16965] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.798754][T16965] device bridge_slave_0 left promiscuous mode [ 479.834153][T16965] bridge0: port 1(bridge_slave_0) entered disabled state [ 480.364420][T16997] device sit0 left promiscuous mode [ 480.372449][T16994] syz.0.4821[16994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.372536][T16994] syz.0.4821[16994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.802980][T17011] device wg2 left promiscuous mode [ 482.139428][T17044] cgroup: fork rejected by pids controller in /syz2 [ 483.874932][T17195] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.895143][T17195] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.904735][T17195] device bridge_slave_0 entered promiscuous mode [ 483.966759][T17195] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.979376][T17195] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.988470][T17195] device bridge_slave_1 entered promiscuous mode [ 484.073182][T17195] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.080307][T17195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 484.087653][T17195] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.094694][T17195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 484.135919][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 484.149328][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 484.160364][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 484.170709][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 484.179844][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 484.194326][T17210] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 484.204986][T17210] syzkaller0: linktype set to 804 [ 484.214956][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 484.231086][T17195] device veth0_vlan entered promiscuous mode [ 484.252077][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 484.261192][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 484.269435][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 484.287119][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 484.296366][T17195] device veth1_macvtap entered promiscuous mode [ 484.323385][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 484.342954][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 484.849695][T17237] device wg2 left promiscuous mode [ 484.914443][T17235] device syzkaller0 entered promiscuous mode [ 485.210363][T17267] device pim6reg1 entered promiscuous mode [ 485.296630][ C0] Illegal XDP return value 16128, expect packet loss! [ 485.375110][ T328] device veth1_macvtap left promiscuous mode [ 485.408328][ T24] audit: type=1400 audit(1751728389.100:174): avc: denied { ioctl } for pid=17274 comm="syz.0.4876" path="" dev="cgroup2" ino=221 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 485.982637][T17317] device pim6reg1 entered promiscuous mode [ 486.744070][T17322] device sit0 entered promiscuous mode [ 487.040648][T17343] device wg2 entered promiscuous mode [ 487.132901][T17337] device pim6reg1 entered promiscuous mode [ 487.471929][T17365] device veth1_macvtap left promiscuous mode [ 488.705685][T17411] syz.2.4912[17411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.705776][T17411] syz.2.4912[17411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.938184][T17413] device syzkaller0 entered promiscuous mode [ 489.023452][T17419] device veth1_macvtap left promiscuous mode [ 489.039746][T17420] device veth1_macvtap entered promiscuous mode [ 489.052936][T17420] device macsec0 entered promiscuous mode [ 489.228258][T17428] device syzkaller0 entered promiscuous mode [ 489.500930][T17439] device pim6reg1 entered promiscuous mode [ 489.690418][T17445] device syzkaller0 entered promiscuous mode [ 490.535897][T17481] device sit0 left promiscuous mode [ 491.517674][T17511] device veth1_macvtap left promiscuous mode [ 491.556495][T17511] device macsec0 left promiscuous mode [ 492.087518][T17543] device pim6reg1 entered promiscuous mode [ 493.315353][T17581] device pim6reg1 entered promiscuous mode [ 493.391862][T17583] device syzkaller0 entered promiscuous mode [ 493.790485][T17597] device wg2 entered promiscuous mode [ 496.168238][T17684] device sit0 entered promiscuous mode [ 497.243455][T17731] device syzkaller0 entered promiscuous mode [ 498.116828][T17797] @0Ù: renamed from bond_slave_1 [ 498.194690][T17801] device syzkaller0 entered promiscuous mode [ 498.792201][T17826] device pim6reg1 entered promiscuous mode [ 498.819235][T17838] Â: renamed from pim6reg1 [ 501.883546][T17892] device wg2 left promiscuous mode [ 502.030851][T17899] device pim6reg1 entered promiscuous mode [ 502.411407][T17909] ªªªªªª: renamed from vlan0 [ 503.182612][T17930] device wg2 left promiscuous mode [ 504.060246][T17962] device pim6reg1 entered promiscuous mode [ 504.893678][T17978] cgroup: fork rejected by pids controller in /syz0 [ 504.942446][T17980] device pim6reg1 entered promiscuous mode [ 505.729171][T18103] ªªªªªª: renamed from vlan0 [ 505.991267][T18101] bridge0: port 1(bridge_slave_0) entered blocking state [ 506.056488][T18101] bridge0: port 1(bridge_slave_0) entered disabled state [ 506.064175][T18101] device bridge_slave_0 entered promiscuous mode [ 506.071810][T18101] bridge0: port 2(bridge_slave_1) entered blocking state [ 506.079362][T18101] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.087183][T18101] device bridge_slave_1 entered promiscuous mode [ 506.208530][T18101] bridge0: port 2(bridge_slave_1) entered blocking state [ 506.215777][T18101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 506.223368][T18101] bridge0: port 1(bridge_slave_0) entered blocking state [ 506.230582][T18101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 506.317464][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 506.346908][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.476433][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 506.495498][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 506.553266][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 506.626703][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 506.696309][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 506.703390][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 506.736399][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 506.745478][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 506.754355][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 506.761442][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 506.775050][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 506.812203][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 506.844657][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 506.853654][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 506.886600][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 506.895366][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 506.918456][T18101] device veth0_vlan entered promiscuous mode [ 506.931841][T18101] device veth1_macvtap entered promiscuous mode [ 506.951994][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 506.960524][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 506.971351][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 507.004156][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 507.016854][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 507.045597][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 507.060621][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 507.076770][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 507.093198][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 507.112019][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 507.125269][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 507.768685][T18150] device wg2 left promiscuous mode [ 508.688087][T18164] device pim6reg1 entered promiscuous mode [ 508.732902][T18176] syz.2.5098[18176] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.732994][T18176] syz.2.5098[18176] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.060113][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 509.080449][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 509.088371][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 509.123674][T18180] device pim6reg1 entered promiscuous mode [ 509.921772][T18217] device veth1_macvtap left promiscuous mode [ 509.998348][T18217] device macsec0 left promiscuous mode [ 512.098457][T18294] ªªªªªª: renamed from vlan0 [ 513.415588][T18319] device syzkaller0 entered promiscuous mode [ 513.462588][T18331] device sit0 entered promiscuous mode [ 514.177645][T18376] device sit0 left promiscuous mode [ 514.258606][T18376] device sit0 entered promiscuous mode [ 515.010657][T18412] tap0: tun_chr_ioctl cmd 1074025677 [ 515.016027][T18412] tap0: linktype set to 825 [ 515.598275][T18452] device sit0 left promiscuous mode [ 515.727371][T18459] device veth1_macvtap left promiscuous mode [ 515.733786][T18459] device macsec0 entered promiscuous mode [ 515.756760][T18472] device pim6reg1 entered promiscuous mode [ 516.052027][T18494] device pim6reg1 entered promiscuous mode [ 516.236437][T18506] device pim6reg1 entered promiscuous mode [ 516.876105][ T24] audit: type=1400 audit(1751728420.560:175): avc: denied { create } for pid=18572 comm="syz.3.5197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 516.983489][T18585] device wg2 entered promiscuous mode [ 517.416831][T18591] device pim6reg1 entered promiscuous mode [ 517.658084][T18597] €Â0: renamed from pim6reg1 [ 517.822104][T18616] device pim6reg1 entered promiscuous mode [ 517.928907][T18621] device wg2 left promiscuous mode [ 520.353026][T18703] ÿÿÿÿÿÿ: renamed from vlan1 [ 520.978532][T18727] device pim6reg1 entered promiscuous mode [ 523.204695][T18778] device syzkaller0 entered promiscuous mode [ 526.458750][T18848] syz.2.5277[18848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.458814][T18848] syz.2.5277[18848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.594358][T18849] syz.2.5277[18849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.637133][T18849] syz.2.5277[18849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.743282][T18848] device wg2 entered promiscuous mode [ 527.047302][T18863] device wg2 left promiscuous mode [ 527.347723][T18882] syz.4.5285[18882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.347818][T18882] syz.4.5285[18882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.487107][T18882] syz.4.5285[18882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.562508][T18882] syz.4.5285[18882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 529.416026][T18957] device pim6reg1 entered promiscuous mode [ 531.171488][T18980] device syzkaller0 entered promiscuous mode [ 532.006868][T19000] device pim6reg1 entered promiscuous mode [ 536.365437][T19117] device sit0 left promiscuous mode [ 536.989203][T19132] ip6erspan0: tun_chr_ioctl cmd 1074025677 [ 537.049079][T19132] ip6erspan0: linktype set to 805 [ 537.778338][T19151] device veth0_vlan left promiscuous mode [ 537.831500][T19151] device veth0_vlan entered promiscuous mode [ 537.957751][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 537.987049][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 538.000681][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 539.121329][T19175] syz.1.5372[19175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.121397][T19175] syz.1.5372[19175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.338597][T19173] bridge0: port 3(veth1) entered blocking state [ 539.356500][T19173] bridge0: port 3(veth1) entered disabled state [ 539.363320][T19173] device veth1 entered promiscuous mode [ 539.369506][T19173] bridge0: port 3(veth1) entered blocking state [ 539.375790][T19173] bridge0: port 3(veth1) entered forwarding state [ 539.601158][T19197] device veth0_vlan left promiscuous mode [ 539.651348][T19197] device veth0_vlan entered promiscuous mode [ 539.712400][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 539.721933][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 539.730988][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 541.434307][T19276] bridge0: port 3(veth1) entered disabled state [ 541.528411][T19276] device syzkaller0 entered promiscuous mode [ 541.632417][T19299] device syzkaller0 entered promiscuous mode [ 541.778292][T19320] device pim6reg1 entered promiscuous mode [ 542.608599][T19343] device wg2 entered promiscuous mode [ 543.066267][T19358] device veth0_vlan left promiscuous mode [ 543.075454][T19358] device veth0_vlan entered promiscuous mode [ 543.090903][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 543.133897][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 543.150769][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 544.093169][T19396] device wg2 left promiscuous mode [ 544.323155][T19402] device sit0 left promiscuous mode [ 544.386601][T19401] device sit0 entered promiscuous mode [ 547.659260][T19460] device sit0 left promiscuous mode [ 547.696068][T19467] device sit0 entered promiscuous mode [ 547.953427][T19475] tap0: tun_chr_ioctl cmd 1074025681 [ 548.199567][T19494] device pim6reg1 entered promiscuous mode [ 549.715605][T19556] device wg2 entered promiscuous mode [ 550.012293][ T24] audit: type=1400 audit(1751728453.700:176): avc: denied { read } for pid=19560 comm="syz.0.5491" name="cgroup.subtree_control" dev="cgroup2" ino=221 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 551.767639][T19649] device macsec0 entered promiscuous mode [ 551.928285][T19656] €Â0: renamed from pim6reg1 [ 552.289645][T19697] device sit0 left promiscuous mode [ 552.807260][T19713] device syzkaller0 entered promiscuous mode [ 552.981074][T19727] device wg2 left promiscuous mode [ 553.180235][T19738] device sit0 entered promiscuous mode [ 555.619911][T19856] device syzkaller0 entered promiscuous mode [ 555.632152][T19859] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 555.645186][T19859] syzkaller0: Linktype set failed because interface is up [ 555.655862][T16875] syzkaller0: tun_net_xmit 48 [ 555.660854][T19862] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 555.666960][T19862] syzkaller0: Linktype set failed because interface is up [ 555.693086][T19856] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 555.703197][T19849] device pim6reg1 entered promiscuous mode [ 555.852111][T19876] device veth0_macvtap entered promiscuous mode [ 557.026390][T19942] device ip_vti0 entered promiscuous mode [ 561.278543][T20035] device pim6reg1 entered promiscuous mode [ 563.904244][T20120] device sit0 left promiscuous mode [ 563.951369][T20121] device sit0 entered promiscuous mode [ 567.930504][T20300] device syzkaller0 entered promiscuous mode [ 570.970964][T20425] device sit0 entered promiscuous mode [ 572.569648][T20507] device pim6reg1 entered promiscuous mode [ 572.806904][T20512] device veth1_macvtap left promiscuous mode [ 572.819633][T20512] device macsec0 left promiscuous mode [ 572.937962][T20512] device veth1_macvtap entered promiscuous mode [ 572.945318][T20512] device macsec0 entered promiscuous mode [ 572.983055][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 573.407629][T20532] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.414698][T20532] bridge0: port 1(bridge_slave_0) entered disabled state [ 573.422401][T20532] device bridge_slave_0 entered promiscuous mode [ 573.432029][T20532] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.439336][T20532] bridge0: port 2(bridge_slave_1) entered disabled state [ 573.446915][T20532] device bridge_slave_1 entered promiscuous mode [ 573.540031][T20532] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.547140][T20532] bridge0: port 2(bridge_slave_1) entered forwarding state [ 573.554472][T20532] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.561625][T20532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 573.615269][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 573.632545][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 573.651374][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 573.718557][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 573.727393][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.734469][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 573.749941][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 573.759351][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.766452][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 573.799511][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 573.826598][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 573.852707][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 573.866185][T20532] device veth0_vlan entered promiscuous mode [ 573.926275][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 573.939014][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 573.955750][T20532] device veth1_macvtap entered promiscuous mode [ 574.018521][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 574.026109][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 574.033790][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 574.042093][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 574.050495][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 574.075266][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 574.090696][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 574.099965][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 574.108445][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 574.842867][T20627] device pim6reg1 entered promiscuous mode [ 575.111609][T20628] device syzkaller0 entered promiscuous mode [ 575.207987][T20637] device veth1_to_bond entered promiscuous mode [ 575.432979][T20647] bridge0: port 3(veth0) entered blocking state [ 575.439647][T20647] bridge0: port 3(veth0) entered disabled state [ 575.446966][T20647] device veth0 entered promiscuous mode [ 575.452777][T20647] bridge0: port 3(veth0) entered blocking state [ 575.459069][T20647] bridge0: port 3(veth0) entered forwarding state [ 575.770508][ T328] Ÿë: port 1(veth0_vlan) entered disabled state [ 575.782057][ T328] device veth1_macvtap left promiscuous mode [ 575.796400][ T328] device veth0_vlan left promiscuous mode [ 576.811105][T20690] tap0: tun_chr_ioctl cmd 2147767511 [ 578.003469][T20733] device sit0 left promiscuous mode [ 578.523574][T20769] syz.1.5840[20769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 578.523643][T20769] syz.1.5840[20769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 579.869999][T20814] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.890825][T20814] bridge0: port 1(bridge_slave_0) entered disabled state [ 580.169445][T20833] device veth1_to_bond entered promiscuous mode [ 581.655436][T20895] device veth0_vlan left promiscuous mode [ 581.685490][T20895] device veth0_vlan entered promiscuous mode [ 581.773237][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 581.782474][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 581.790372][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 582.867748][T20920] device sit0 entered promiscuous mode [ 583.356479][T20932] device sit0 left promiscuous mode [ 585.642149][T21002] device veth0_vlan left promiscuous mode [ 585.660766][T21002] device veth0_vlan entered promiscuous mode [ 585.837895][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 585.858883][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 585.889058][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 589.065345][T21092] device veth0_vlan left promiscuous mode [ 589.071594][T21092] device veth0_vlan entered promiscuous mode [ 589.096778][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 589.127315][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 589.135065][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 589.166590][T21102] device syzkaller0 entered promiscuous mode [ 593.600114][T21206] device syzkaller0 entered promiscuous mode [ 593.893064][T21230] syz.1.5978[21230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.893143][T21230] syz.1.5978[21230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.688698][T21244] device syzkaller0 entered promiscuous mode [ 594.803495][T21256] device veth0_vlan left promiscuous mode [ 594.822483][T21256] device veth0_vlan entered promiscuous mode [ 594.902269][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 594.912126][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 594.927720][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 595.150047][T21262] device syzkaller0 entered promiscuous mode [ 596.093793][T21283] device sit0 entered promiscuous mode [ 596.668532][T21319] device pim6reg1 entered promiscuous mode [ 598.034860][T21441] syz.2.6043[21441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.034934][T21441] syz.2.6043[21441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.216528][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 598.237179][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 598.244890][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 600.190863][T21505] €Â0: renamed from pim6reg1 [ 602.979701][T21609] device pim6reg1 entered promiscuous mode [ 603.965519][T21629] device macsec0 left promiscuous mode [ 603.975393][T21628] device veth1_macvtap entered promiscuous mode [ 604.032340][T21628] device macsec0 entered promiscuous mode [ 604.061594][T21631] device veth0_vlan left promiscuous mode [ 604.071533][T21631] device veth0_vlan entered promiscuous mode [ 604.087709][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 604.255969][T21644] device bridge0 entered promiscuous mode [ 605.121165][T21698] tun0: tun_chr_ioctl cmd 1074025676 [ 605.136582][T21698] tun0: owner set to 0 [ 605.196984][T21698] €Â0: renamed from pim6reg1 [ 606.597865][T21767] device wg2 entered promiscuous mode [ 607.882264][T21821] device syzkaller0 entered promiscuous mode [ 608.511337][T21845] device veth0_vlan left promiscuous mode [ 608.528429][T21845] device veth0_vlan entered promiscuous mode [ 608.564217][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 608.572998][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 608.586717][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 609.436303][T21859] device veth1_macvtap left promiscuous mode [ 609.757284][T21869] device veth0_vlan left promiscuous mode [ 609.949561][T21869] device veth0_vlan entered promiscuous mode [ 610.212166][T21896] device pim6reg1 entered promiscuous mode [ 612.771873][T21996] €Â0: renamed from pim6reg1 [ 614.516481][T22008] device sit0 entered promiscuous mode [ 615.613062][T22030] device syzkaller0 entered promiscuous mode [ 616.436311][T22090] device veth1 left promiscuous mode [ 616.441745][T22090] bridge0: port 3(veth1) entered disabled state [ 616.508609][T22090] device bridge_slave_1 left promiscuous mode [ 616.550553][T22090] bridge0: port 2(bridge_slave_1) entered disabled state [ 616.625609][T22090] device bridge_slave_0 left promiscuous mode [ 616.637717][T22090] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.708781][T22093] device wg2 left promiscuous mode [ 619.417489][T22236] device veth1_macvtap left promiscuous mode [ 619.424572][T22236] device macsec0 left promiscuous mode [ 620.088676][T22254] device sit0 entered promiscuous mode [ 620.646435][T22275] device veth1_macvtap entered promiscuous mode [ 620.652882][T22275] device macsec0 entered promiscuous mode [ 620.666915][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 620.726014][T22288] device pim6reg1 entered promiscuous mode [ 620.829971][T22299] syz.4.6300[22299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 621.689855][T22335] device pim6reg1 entered promiscuous mode [ 624.483631][T22451] ref_ctr_offset mismatch. inode: 0xb11 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 624.500186][T22455] device macsec0 entered promiscuous mode [ 624.561243][T22449] GPL: port 1(erspan0) entered blocking state [ 624.588129][T22449] GPL: port 1(erspan0) entered disabled state [ 624.620212][T22449] device erspan0 entered promiscuous mode [ 627.105514][T22559] device syzkaller0 entered promiscuous mode [ 627.384648][T22573] device syzkaller0 entered promiscuous mode [ 628.110003][T22619] device veth0_vlan left promiscuous mode [ 628.156253][T22619] device veth0_vlan entered promiscuous mode [ 628.586177][T22651] device veth0_vlan left promiscuous mode [ 628.726432][T22651] device veth0_vlan entered promiscuous mode [ 638.062542][T22904] ÿÿÿÿÿÿ: renamed from vlan1 [ 638.602204][T22937] syz.2.6484[22937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.602300][T22937] syz.2.6484[22937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 640.617298][T23008] device syzkaller0 entered promiscuous mode [ 641.279309][T23021] syz.3.6509[23021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.279386][T23021] syz.3.6509[23021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.726435][T23046] syz.2.6516[23046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.799352][T23046] syz.2.6516[23046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.896589][T23046] syz.2.6516[23046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 643.832546][T23067] device syzkaller0 entered promiscuous mode [ 644.983146][T23097] bridge0: port 3(veth1) entered blocking state [ 644.992155][T23097] bridge0: port 3(veth1) entered disabled state [ 645.018553][T23097] device veth1 entered promiscuous mode [ 645.026416][T23097] bridge0: port 3(veth1) entered blocking state [ 645.032869][T23097] bridge0: port 3(veth1) entered forwarding state [ 645.068730][T23105] device syzkaller0 entered promiscuous mode [ 646.062212][T23142] syz.0.6546[23142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 646.062302][T23142] syz.0.6546[23142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 646.137485][T23154] bridge0: port 3(veth1) entered disabled state [ 648.584903][T23221] bridge0: port 1(bridge_slave_0) entered blocking state [ 648.592282][T23221] bridge0: port 1(bridge_slave_0) entered disabled state [ 648.599918][T23221] device bridge_slave_0 entered promiscuous mode [ 648.657171][T23221] bridge0: port 2(bridge_slave_1) entered blocking state [ 648.666640][T23221] bridge0: port 2(bridge_slave_1) entered disabled state [ 648.674437][T23221] device bridge_slave_1 entered promiscuous mode [ 649.174626][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 649.185529][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 649.193399][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 649.202119][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 649.211264][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 649.218475][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 649.321409][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 649.329471][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 649.339825][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 649.349607][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 649.356757][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 649.488430][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 649.496773][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 649.504777][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 649.513206][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 649.656475][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 649.745916][T23221] device veth0_vlan entered promiscuous mode [ 649.783360][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 649.794088][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 649.802049][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 649.942759][ T348] device veth0_vlan left promiscuous mode [ 650.033159][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 650.058057][T23221] device veth1_macvtap entered promiscuous mode [ 650.168312][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 650.181098][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 650.232883][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 650.243170][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 650.817095][T23290] device syzkaller0 entered promiscuous mode [ 653.528325][T23363] device syzkaller0 entered promiscuous mode [ 654.877416][T23416] device wg2 entered promiscuous mode [ 656.255595][T23446] device pim6reg1 entered promiscuous mode [ 656.505762][T23460] Â: renamed from pim6reg1 [ 657.088245][T23493] device sit0 entered promiscuous mode [ 657.601436][T23486] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.611001][T23486] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.692579][T23486] device bridge_slave_0 entered promiscuous mode [ 657.706635][T23486] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.719241][T23486] bridge0: port 2(bridge_slave_1) entered disabled state [ 657.732410][T23486] device bridge_slave_1 entered promiscuous mode [ 658.216149][ T348] device erspan0 left promiscuous mode [ 658.236237][ T348] GPL: port 1(erspan0) entered disabled state [ 658.646092][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 658.676623][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 658.777346][ T348] device veth0 left promiscuous mode [ 658.787679][ T348] bridge0: port 3(veth0) entered disabled state [ 658.876627][ T348] device bridge_slave_1 left promiscuous mode [ 658.918091][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.953592][ T348] device bridge_slave_0 left promiscuous mode [ 658.984593][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 659.017325][ T348] device veth0_vlan left promiscuous mode [ 659.140606][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 659.149423][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 659.157735][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.164833][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 659.172642][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 659.181499][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 659.190070][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.197159][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 659.367403][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 659.375255][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 659.383843][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 659.391942][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 659.400733][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 659.520338][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 659.563192][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 659.572304][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 659.580536][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 659.640354][T23486] device veth0_vlan entered promiscuous mode [ 659.649272][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 659.657471][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 659.703571][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 659.711859][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 659.721400][T23486] device veth1_macvtap entered promiscuous mode [ 659.870820][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 659.883027][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 659.891771][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 659.900769][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 659.909521][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 661.670272][T23581] bridge0: port 2(bridge_slave_1) entered disabled state [ 661.678780][T23581] bridge0: port 1(bridge_slave_0) entered disabled state [ 661.734620][T23582] device bridge_slave_1 left promiscuous mode [ 661.749256][T23582] bridge0: port 2(bridge_slave_1) entered disabled state [ 661.780988][T23582] device bridge_slave_0 left promiscuous mode [ 661.787317][T23582] bridge0: port 1(bridge_slave_0) entered disabled state [ 661.848471][T23585] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.150657][T23610] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 662.740903][T23634] device sit0 left promiscuous mode [ 662.934689][T23634] device sit0 entered promiscuous mode [ 663.289186][T23656] syz.4.6687[23656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.289255][T23656] syz.4.6687[23656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.300767][T23654] tap0: tun_chr_ioctl cmd 1074025677 [ 663.421669][T23654] tap0: linktype set to 768 [ 664.461149][T23700] device veth1_macvtap left promiscuous mode [ 664.481046][T23700] device macsec0 entered promiscuous mode [ 665.236098][T23715] device pim6reg1 entered promiscuous mode [ 666.995324][T23805] device syzkaller0 entered promiscuous mode [ 667.281021][T23855] syz.1.6744[23855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.281085][T23855] syz.1.6744[23855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.318329][T23855] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 667.363027][T23855] device syzkaller0 entered promiscuous mode [ 667.587167][T23876] device wg2 left promiscuous mode [ 667.726002][T23874] device wg2 entered promiscuous mode [ 667.795780][T23888] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.872258][T23932] device syzkaller0 entered promiscuous mode [ 669.918524][T23954] bridge0: port 1(bridge_slave_0) entered blocking state [ 669.927495][T23954] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.935045][T23954] device bridge_slave_0 entered promiscuous mode [ 669.974042][T23954] bridge0: port 2(bridge_slave_1) entered blocking state [ 669.981253][T23954] bridge0: port 2(bridge_slave_1) entered disabled state [ 669.989658][T23954] device bridge_slave_1 entered promiscuous mode [ 670.147999][T23954] bridge0: port 2(bridge_slave_1) entered blocking state [ 670.155129][T23954] bridge0: port 2(bridge_slave_1) entered forwarding state [ 670.162481][T23954] bridge0: port 1(bridge_slave_0) entered blocking state [ 670.169562][T23954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 670.192560][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.226656][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.362659][ T348] GPL: port 1(erspan0) entered disabled state [ 670.375536][ T348] device erspan0 left promiscuous mode [ 670.398991][ T348] GPL: port 1(erspan0) entered disabled state [ 670.574940][T23954] device veth0_vlan entered promiscuous mode [ 670.749173][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 670.757339][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 670.764963][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 670.773602][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 670.781863][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 670.788906][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 670.796366][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 670.804701][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 670.813207][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 670.820317][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 670.827885][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 670.836108][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 670.844647][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 670.852813][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 670.860871][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 670.869220][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 670.877942][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 670.886081][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 670.927474][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 670.935102][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 670.948472][T23954] device veth1_macvtap entered promiscuous mode [ 670.955580][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 670.966060][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 670.974956][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 671.001957][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 671.011186][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 671.084655][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 671.110296][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 671.255237][ T348] Ÿë: port 1(veth0_vlan) entered disabled state [ 671.282903][ T348] device veth1_macvtap left promiscuous mode [ 671.389829][ T348] device veth0_vlan left promiscuous mode [ 672.022409][T24009] device veth0_vlan left promiscuous mode [ 672.029955][T24009] device veth0_vlan entered promiscuous mode [ 672.050800][T24016] device wg2 left promiscuous mode [ 672.102954][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 672.111539][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 672.127415][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 672.291955][T24024] device veth1_macvtap entered promiscuous mode [ 672.450607][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 672.561809][T24038] device syzkaller0 entered promiscuous mode [ 675.283922][T24170] device veth1_to_bond entered promiscuous mode [ 676.715588][T24246] device veth0_vlan left promiscuous mode [ 676.761567][T24246] device veth0_vlan entered promiscuous mode [ 676.817648][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 676.831810][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 676.913634][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 677.306573][T24281] syz.2.6870[24281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.306632][T24281] syz.2.6870[24281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 679.918226][T24375] device sit0 left promiscuous mode [ 680.289439][T24385] cgroup: fork rejected by pids controller in /syz1 [ 683.100696][T24532] device wg2 entered promiscuous mode [ 683.169839][T24532] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.691315][T24592] device pim6reg1 entered promiscuous mode [ 684.804308][T24610] syz.0.6951[24610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 684.804386][T24610] syz.0.6951[24610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 685.039098][T24613] device veth0_vlan left promiscuous mode [ 685.060927][T24613] device veth0_vlan entered promiscuous mode [ 685.108981][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 685.121464][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 685.133205][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 685.309707][T24639] device syzkaller0 entered promiscuous mode [ 685.995347][T24685] device pim6reg1 entered promiscuous mode [ 686.228574][T24685] device syzkaller0 entered promiscuous mode [ 686.736137][T24706] syz.1.6968[24706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 686.736253][T24706] syz.1.6968[24706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 687.515878][T24739] device wg2 left promiscuous mode [ 687.584558][T24746] device syzkaller0 entered promiscuous mode [ 687.598184][T24744] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 687.613581][T24744] device syzkaller0 entered promiscuous mode [ 690.744192][T24838] device syzkaller0 entered promiscuous mode [ 691.672101][T24893] device syzkaller0 entered promiscuous mode [ 692.027403][T24907] device wg2 entered promiscuous mode [ 692.698646][T24924] device pim6reg1 entered promiscuous mode [ 693.125280][T24934] device pim6reg1 entered promiscuous mode [ 694.887681][T25000] ÿÿÿÿÿÿ: renamed from vlan1 [ 694.966351][T25002] device veth0_vlan left promiscuous mode [ 694.988477][T25002] device veth0_vlan entered promiscuous mode [ 695.146957][T24999] bridge0: port 1(bridge_slave_0) entered blocking state [ 695.154144][T24999] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.161676][T24999] device bridge_slave_0 entered promiscuous mode [ 695.176235][T24999] bridge0: port 2(bridge_slave_1) entered blocking state [ 695.296454][T24999] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.308077][T24999] device bridge_slave_1 entered promiscuous mode [ 695.459228][T25012] tap0: tun_chr_ioctl cmd 21731 [ 695.530868][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 695.546627][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 695.589802][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 695.598347][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 695.608172][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 695.615266][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 695.623245][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 695.632062][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 695.640487][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 695.647561][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 695.736307][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 695.787042][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 695.815234][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 695.883286][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 696.004514][T24999] device veth0_vlan entered promiscuous mode [ 696.011245][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 696.085750][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 696.093549][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 696.124349][T24999] device veth1_macvtap entered promiscuous mode [ 696.157702][T25035] device veth1_to_bond left promiscuous mode [ 696.237876][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 696.282329][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 696.297233][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 697.119637][T25071] device syzkaller0 entered promiscuous mode [ 697.449838][T25094] device syzkaller0 entered promiscuous mode [ 697.460490][T25102] device pim6reg1 entered promiscuous mode [ 697.524882][T22456] device bridge_slave_1 left promiscuous mode [ 697.538806][T22456] bridge0: port 2(bridge_slave_1) entered disabled state [ 697.554768][T22456] device bridge_slave_0 left promiscuous mode [ 697.561121][T22456] bridge0: port 1(bridge_slave_0) entered disabled state [ 697.571511][T22456] device veth1_macvtap left promiscuous mode [ 697.577672][T22456] device veth0_vlan left promiscuous mode [ 698.874110][T25141] device pim6reg1 entered promiscuous mode [ 699.084934][T25144] device pim6reg1 entered promiscuous mode [ 702.775604][T25223] device veth0_vlan left promiscuous mode [ 702.796493][T25223] device veth0_vlan entered promiscuous mode [ 702.834800][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 702.844192][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 702.852365][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 703.877741][T25308] device sit0 entered promiscuous mode [ 704.368011][T25345] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 704.506879][T25352] ref_ctr_offset mismatch. inode: 0x28a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 705.692115][T25416] device veth1_macvtap left promiscuous mode [ 706.778160][T25482] device pim6reg1 entered promiscuous mode [ 708.502938][T25537] bridge0: port 2(bridge_slave_1) entered disabled state [ 708.512117][T25537] bridge0: port 1(bridge_slave_0) entered disabled state [ 709.789830][T25576] device sit0 entered promiscuous mode [ 710.316361][T25624] device veth1_macvtap left promiscuous mode [ 710.382617][T25624] device macsec0 entered promiscuous mode [ 710.769976][T25646] device pim6reg1 entered promiscuous mode [ 711.249390][T25660] device wg2 entered promiscuous mode [ 719.886938][T25693] device pim6reg1 entered promiscuous mode [ 722.320887][T25782] device wg2 left promiscuous mode [ 723.567462][T25831] device sit0 left promiscuous mode [ 723.683934][T25830] device sit0 entered promiscuous mode [ 724.011204][T25834] device pim6reg1 entered promiscuous mode [ 725.513536][T25915] device syzkaller0 entered promiscuous mode [ 727.184169][T25943] syz.0.7341[25943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 727.184262][T25943] syz.0.7341[25943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 727.627246][T25958] device veth0_vlan left promiscuous mode [ 727.674547][T25958] device veth0_vlan entered promiscuous mode [ 727.682387][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 727.697437][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 727.725941][T22456] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 728.369792][T25988] device syzkaller0 entered promiscuous mode [ 729.564962][T26030] device pim6reg1 entered promiscuous mode [ 729.868158][T26049] device sit0 left promiscuous mode [ 730.500041][T26097] device syzkaller0 entered promiscuous mode [ 731.018021][T26122] device syzkaller0 entered promiscuous mode [ 731.293910][T26146] syz.0.7401[26146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 731.293977][T26146] syz.0.7401[26146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 731.359478][T26151] device pim6reg1 entered promiscuous mode [ 731.974685][T26188] device pim6reg1 entered promiscuous mode [ 733.469841][T26253] ªªªªªª: renamed from vlan0 [ 734.644630][T26273] device syzkaller0 entered promiscuous mode [ 734.863284][T26290] device veth0_vlan left promiscuous mode [ 734.887882][T26290] device veth0_vlan entered promiscuous mode [ 736.318659][T26344] syz.0.7460[26344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 736.318754][T26344] syz.0.7460[26344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 736.364613][T26345] vcan0: tun_chr_ioctl cmd 3221517374 [ 738.939872][T26431] device pim6reg1 entered promiscuous mode [ 740.561609][T26487] syz.3.7504[26487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 740.561700][T26487] syz.3.7504[26487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 740.659345][T26477] device syzkaller0 entered promiscuous mode [ 741.436025][T26504] device pim6reg1 entered promiscuous mode [ 741.728815][T26516] device veth1_macvtap entered promiscuous mode [ 741.807114][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 742.275436][T26534] device sit0 left promiscuous mode [ 742.533374][T26544] bridge0: port 2(bridge_slave_1) entered disabled state [ 742.589785][T26548] device bridge_slave_1 left promiscuous mode [ 742.595987][T26548] bridge0: port 2(bridge_slave_1) entered disabled state [ 742.603524][T26548] device bridge_slave_0 left promiscuous mode [ 742.610043][T26548] bridge0: port 1(bridge_slave_0) entered disabled state [ 742.923637][T26564] device syzkaller0 entered promiscuous mode [ 743.282969][T26583] device wg2 entered promiscuous mode [ 743.677730][T26593] device sit0 entered promiscuous mode [ 744.568409][T26619] device syzkaller0 entered promiscuous mode [ 745.163814][T26643] device wg2 left promiscuous mode [ 748.549170][T26772] vcan0: tun_chr_ioctl cmd 3221517374 [ 751.587098][T26897] device syzkaller0 entered promiscuous mode [ 753.423905][T26945] device sit0 left promiscuous mode [ 753.494299][T26949] device sit0 entered promiscuous mode [ 754.568057][T26965] device wg2 entered promiscuous mode [ 756.360650][T27010] device syzkaller0 entered promiscuous mode [ 756.921989][T27024] syz.0.7660[27024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 756.922169][T27024] syz.0.7660[27024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 757.218912][T27027] device wg2 entered promiscuous mode [ 759.598608][T27086] device wg2 entered promiscuous mode [ 760.253092][T27100] device syzkaller0 entered promiscuous mode [ 762.434994][T27159] syz.2.7698[27159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.436425][T27159] syz.2.7698[27159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.502400][T27163] device pim6reg1 entered promiscuous mode [ 763.581185][T27214] 7B’ç÷ï: renamed from syzkaller0 [ 763.945634][T27220] device pim6reg1 entered promiscuous mode [ 764.014726][T27222] device wg2 left promiscuous mode [ 764.223090][T27227] device wg2 left promiscuous mode [ 765.138538][T27258] device veth0_vlan left promiscuous mode [ 765.164506][T27258] device veth0_vlan entered promiscuous mode [ 765.230432][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 765.247578][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 765.255466][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 765.318937][T27272] device wg2 left promiscuous mode [ 765.425190][T27277] syz.0.7735[27277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 765.425257][T27277] syz.0.7735[27277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 765.449956][T27272] device wg2 entered promiscuous mode [ 765.826287][T27303] device sit0 left promiscuous mode [ 766.024684][T27301] device pim6reg1 entered promiscuous mode [ 766.063506][T27304] device sit0 entered promiscuous mode [ 766.275382][T27323] device pim6reg1 entered promiscuous mode [ 766.374280][T27331] device pim6reg1 entered promiscuous mode [ 767.697620][T27393] device pim6reg1 entered promiscuous mode [ 824.766518][T27514] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.773580][T27514] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.781139][T27514] device bridge_slave_0 entered promiscuous mode [ 824.790658][T27514] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.797850][T27514] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.805333][T27514] device bridge_slave_1 entered promiscuous mode [ 824.811887][T27511] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.819019][T27511] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.826506][T27511] device bridge_slave_0 entered promiscuous mode [ 824.833499][T27511] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.840638][T27511] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.848102][T27511] device bridge_slave_1 entered promiscuous mode [ 824.889494][T27513] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.896637][T27513] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.904014][T27513] device bridge_slave_0 entered promiscuous mode [ 824.920340][T27513] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.927430][T27513] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.934785][T27513] device bridge_slave_1 entered promiscuous mode [ 824.947196][T27512] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.954250][T27512] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.961862][T27512] device bridge_slave_0 entered promiscuous mode [ 824.981529][T27512] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.988632][T27512] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.996081][T27512] device bridge_slave_1 entered promiscuous mode [ 825.058867][T27515] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.065927][T27515] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.073492][T27515] device bridge_slave_0 entered promiscuous mode [ 825.094436][T27515] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.101551][T27515] bridge0: port 2(bridge_slave_1) entered disabled state [ 825.109102][T27515] device bridge_slave_1 entered promiscuous mode [ 825.169915][T27514] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.176992][T27514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 825.184269][T27514] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.191314][T27514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 825.209398][ T9] device bridge_slave_1 left promiscuous mode [ 825.215548][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 825.223061][ T9] device bridge_slave_0 left promiscuous mode [ 825.229482][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.360825][T27513] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.367909][T27513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 825.375188][T27513] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.382238][T27513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 825.393287][T27512] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.400498][T27512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 825.407806][T27512] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.414829][T27512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 825.430081][T27515] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.437165][T27515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 825.444436][T27515] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.451485][T27515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 825.467040][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 825.476766][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.484105][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 825.492550][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.499843][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 825.507156][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.514354][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 825.521852][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.529084][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 825.558209][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 825.567134][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 825.575278][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.582338][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 825.590502][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 825.599195][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 825.608135][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.615167][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 825.636724][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 825.644915][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 825.653128][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 825.662120][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 825.670488][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 825.678054][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 825.707114][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 825.715839][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 825.724310][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.731399][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 825.740098][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 825.748836][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 825.757339][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.764404][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 825.771887][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 825.779604][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 825.787117][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 825.795379][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 825.803691][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.810741][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 825.818200][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 825.826635][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 825.834782][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.841836][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 825.849256][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 825.857418][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 825.865347][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 825.873826][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 825.882210][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 825.890504][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 825.909255][T27514] device veth0_vlan entered promiscuous mode [ 825.918047][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 825.926025][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 825.934789][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 825.942467][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 825.957290][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 825.964768][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 825.972729][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 825.981248][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 825.989476][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.996522][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 826.021241][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 826.030049][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 826.038665][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 826.047255][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 826.055237][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 826.062941][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 826.070586][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 826.079012][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 826.087428][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 826.094470][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 826.101907][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 826.110272][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 826.118524][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.125549][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 826.133179][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 826.141711][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 826.149983][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.157026][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 826.167086][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 826.178321][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 826.191191][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 826.199820][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 826.227901][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 826.237123][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 826.244798][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 826.255493][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 826.265968][T27512] device veth0_vlan entered promiscuous mode [ 826.292489][T27514] device veth1_macvtap entered promiscuous mode [ 826.300173][T27511] device veth0_vlan entered promiscuous mode [ 826.306833][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 826.314939][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 826.323690][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 826.331971][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 826.340095][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 826.348450][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 826.355925][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 826.364571][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 826.372828][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 826.391578][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 826.400052][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 826.414781][T27512] device veth1_macvtap entered promiscuous mode [ 826.422333][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 826.431262][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 826.439874][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 826.448378][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 826.462113][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 826.470661][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 826.482232][ T348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 826.511385][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 826.519993][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 826.535087][T27515] device veth0_vlan entered promiscuous mode [ 826.542426][T27511] device veth1_macvtap entered promiscuous mode [ 826.567358][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 826.575817][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 826.585763][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 826.596848][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 826.604368][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 826.614049][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 826.622195][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 826.657222][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 826.665465][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 826.684468][T27515] device veth1_macvtap entered promiscuous mode [ 826.706308][T27513] device veth0_vlan entered promiscuous mode [ 826.722102][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 826.733401][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 826.743026][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 826.761914][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 826.774254][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 826.782317][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 826.791096][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 826.834529][T27513] device veth1_macvtap entered promiscuous mode [ 826.872065][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 826.885904][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 826.906281][ T24] audit: type=1400 audit(1751728730.590:177): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[13977]" dev="pipefs" ino=13977 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 826.908474][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 826.939167][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 827.030776][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 827.039769][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 827.048413][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 827.056953][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 827.065545][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 827.583742][ T9] device bridge_slave_1 left promiscuous mode [ 827.590179][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 827.597896][ T9] device bridge_slave_0 left promiscuous mode [ 827.604058][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 827.613207][ T9] device veth1 left promiscuous mode [ 827.618767][ T9] bridge0: port 3(veth1) entered disabled state [ 827.625779][ T9] device bridge_slave_1 left promiscuous mode [ 827.632199][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 827.639837][ T9] device bridge_slave_0 left promiscuous mode [ 827.646003][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 827.655213][ T9] device veth1_macvtap left promiscuous mode [ 827.661656][ T9] device veth0_vlan left promiscuous mode [ 827.667668][ T9] device veth1_macvtap left promiscuous mode [ 827.673695][ T9] device veth0_vlan left promiscuous mode [ 827.679808][ T9] device veth1_macvtap left promiscuous mode [ 827.685840][ T9] device veth0_vlan left promiscuous mode [ 830.297222][ T9] device bridge_slave_1 left promiscuous mode [ 830.303371][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.310978][ T9] device bridge_slave_0 left promiscuous mode [ 830.317199][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.325750][ T9] device bridge_slave_1 left promiscuous mode [ 830.332247][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.339811][ T9] device bridge_slave_0 left promiscuous mode [ 830.345926][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.353862][ T9] device bridge_slave_1 left promiscuous mode [ 830.360089][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.367842][ T9] device bridge_slave_0 left promiscuous mode [ 830.373998][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.382154][ T9] device bridge_slave_1 left promiscuous mode [ 830.388551][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.396292][ T9] device bridge_slave_0 left promiscuous mode [ 830.402444][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.410433][ T9] device bridge_slave_1 left promiscuous mode [ 830.416734][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.424291][ T9] device bridge_slave_0 left promiscuous mode [ 830.430550][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.439259][ T9] device veth1_macvtap left promiscuous mode [ 830.445285][ T9] device veth0_vlan left promiscuous mode [ 830.451284][ T9] device veth1_macvtap left promiscuous mode [ 830.457393][ T9] device veth0_vlan left promiscuous mode [ 830.463411][ T9] device veth1_macvtap left promiscuous mode [ 830.469487][ T9] device veth0_vlan left promiscuous mode [ 830.475372][ T9] device veth1_macvtap left promiscuous mode [ 830.481736][ T9] device veth0_vlan left promiscuous mode [ 830.487705][ T9] device veth1_macvtap left promiscuous mode [ 830.493705][ T9] device veth0_vlan left promiscuous mode