last executing test programs: 14m54.190705263s ago: executing program 32 (id=3076): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000040000000600000023"], 0x50) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x12, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000950000441b000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7f3}, 0x94) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001400010000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x7}, 0x100, 0x4, 0x0, 0x9, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9a9c, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffc}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r2) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x8810) (async) sendmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000001000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000380)='kmem_cache_free\x00', r6}, 0x18) (async) close(r4) close(0xffffffffffffffff) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) (async) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11m10.800214652s ago: executing program 1 (id=5606): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0xc}, 0x801, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x1, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486"], 0xfdef) 11m10.44393167s ago: executing program 1 (id=5612): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486"], 0x20a) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x2}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000004440)={&(0x7f0000000ec0)=@id, 0x10, 0x0}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x8, 0x4}, 0x0, 0xc48, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x1) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r6}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) 11m9.800788822s ago: executing program 5 (id=5623): r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000080)=@raw=[@exit, @tail_call, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}, @alu={0x7, 0x1, 0x0, 0xb, 0x6, 0x40, 0x8}, @ringbuf_query], &(0x7f0000000100)='GPL\x00', 0x4, 0xcb, &(0x7f0000000140)=""/203, 0x40f00, 0x42, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0x10, 0x7ff, 0x9}, 0x10, 0x1dd91, 0xffffffffffffffff, 0x3, &(0x7f00000002c0)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000300)=[{0x1, 0x1, 0x4, 0xc}, {0x5, 0x1, 0x2, 0x2}, {0x2, 0x1, 0xf, 0x8}], 0x10, 0x81}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@fallback=0xffffffffffffffff, 0xc, 0x1, 0x4ddc, &(0x7f0000000400)=[0x0], 0x1, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_ext={0x1c, 0x38, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xd468}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @generic={0x72, 0xb, 0xa, 0x5, 0x8}, @ringbuf_query, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc000000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x4}, @exit, @map_val={0x18, 0x9, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @ldst={0x1, 0x2, 0x5, 0xb, 0x9, 0xf6d2ca91f9cb453, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10000}}, @ringbuf_query], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000780)='syzkaller\x00', 0x5, 0xad, &(0x7f00000007c0)=""/173, 0x41100, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xc851, 0xffffffffffffffff, 0x3, &(0x7f00000008c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000900)=[{0x0, 0x4, 0xb, 0xc}, {0x4, 0x1, 0x3, 0x2}, {0x2, 0x5, 0xd, 0x3}], 0x10, 0x50}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@cgroup=r4, r0, 0x17, 0x14, r1, @void, @value=r5, @void, @void, r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x17, 0x15, &(0x7f0000000a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x2, 0x1, 0x1, 0x3, 0x2, 0x30}, @call={0x85, 0x0, 0x0, 0x9a}, @generic={0x4, 0xa, 0x3, 0x9, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @generic={0x6, 0xf, 0x7, 0xe6, 0x1817}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000ac0)='GPL\x00', 0xc2, 0x85, &(0x7f0000000b00)=""/133, 0x0, 0x4, '\x00', 0x0, @cgroup_sysctl=0x12, r2, 0x8, &(0x7f0000000bc0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0xb, 0x80000001, 0x8000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000c40)=[{0x4, 0x4, 0x6, 0x5}, {0x3, 0x5, 0xd, 0x5}, {0x3, 0x3, 0x9, 0x7}, {0x1, 0x5, 0x10, 0x6}, {0x3, 0x1, 0x2, 0x2}, {0x5, 0x3, 0x3, 0x3}], 0x10, 0x6}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f80)={r2, 0x58, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000011c0)={r2, 0x20, &(0x7f0000001180)={&(0x7f0000001000)=""/232, 0xe8, 0x0, &(0x7f0000001100)=""/81, 0x51}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x19, 0x4, &(0x7f0000000d80)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x4}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}], &(0x7f0000000dc0)='GPL\x00', 0x10001, 0xc4, &(0x7f0000000e00)=""/196, 0x41000, 0x10, '\x00', r6, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000fc0)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, r7, r5, 0x2, &(0x7f0000001200)=[r2], &(0x7f0000001240)=[{0x3, 0x2, 0x9, 0x9}, {0x2, 0x5, 0x2, 0x6}], 0x10, 0x6}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002500)={r0, 0x0, 0x2a, 0x4e, &(0x7f0000001340)="1052e30616d63bf21ba2a048d4d7408e53085f2b53f29623b8277eecfa0135d0ea7d22adba96d1e1fee0", &(0x7f0000001380)=""/78, 0x6, 0x0, 0x1000, 0xd3, &(0x7f0000001400)="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", &(0x7f0000002400)="e4d8218a9f8116112447597abb27732fb5f0d918ad9ef5b2dae0a2aee3dda39192394f658ff2da683a481721b9eb280c472e7867b417ff474c6943d9ad2429b0285013a5fef491007bde5dec4931a6d6c1a397298cfe8d85c886d10e9b4a80e277915233707dcf53009310ba0096cc30c3cc50d08d521c67586e8face902f7e23fd2875707338475497c7506d292f2e8c08391b14ba527990ac31ef4a6101957b0e118712b11c2a543ad0f2e590462f72fcada162fed088a404ed42a1ee965c801e2b7f4ee50560715fe309cad5e2b949bb81a", 0x0, 0x0, 0x80000000}, 0x50) openat$cgroup_netprio_ifpriomap(r4, &(0x7f0000002580), 0x2, 0x0) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002840)={0x6, 0x26, &(0x7f00000025c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0x1}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ldst={0x3, 0x3, 0x0, 0x2, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5731, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0xffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002700)='GPL\x00', 0x80000000, 0x0, 0x0, 0x41100, 0x88, '\x00', r6, 0x25, r2, 0x8, &(0x7f0000002740)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000002780)={0x4, 0x5, 0x1, 0x7fffffff}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000027c0)=[r2, r2, r2, 0x1], &(0x7f0000002800)=[{0x1, 0x2, 0xc, 0xf}, {0x1, 0x3, 0x5, 0x7}, {0x1, 0x2, 0x2, 0x4}], 0x10, 0x800}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000002900)={r8, r2}, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r2) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002940)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1e6, '\x00', r6, r2, 0x5, 0x3, 0x5}, 0x50) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002a80)=r7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002dc0)={r2, 0xe0, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000002b00)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000002b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002b80)=[0x0], 0x0, 0x5f, &(0x7f0000002bc0)=[{}], 0x8, 0x10, &(0x7f0000002c00), &(0x7f0000002c40), 0x8, 0x90, 0x8, 0x8, &(0x7f0000002c80)}}, 0x10) r12 = openat$cgroup_ro(r2, &(0x7f0000002e00)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002ec0)={{r9, 0xffffffffffffffff}, &(0x7f0000002e40), &(0x7f0000002e80)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x1b, 0x7, &(0x7f00000029c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe26f, 0x0, 0x0, 0x0, 0x100}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x8, 0x8, 0x80}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000002a00)='GPL\x00', 0x800, 0x4, &(0x7f0000002a40)=""/4, 0x40f00, 0x0, '\x00', r6, @fallback=0x1d, r10, 0x8, &(0x7f0000002ac0)={0x9, 0x2}, 0x8, 0x10, 0x0, 0x0, r11, r12, 0x9, &(0x7f0000002f00)=[r13], &(0x7f0000002f40)=[{0x3, 0x4, 0xa, 0xa}, {0x5, 0x4, 0x7, 0xc}, {0x2, 0x3, 0x0, 0x5}, {0x1, 0x1, 0xf, 0x8}, {0x0, 0x3, 0x3, 0x9}, {0x0, 0x4, 0x7, 0x4}, {0x7f, 0x1, 0x9, 0x7}, {0x3, 0x1, 0x2, 0x2}, {0x0, 0x2, 0x10}], 0x10, 0x8}, 0x94) close(r2) r14 = openat$tun(0xffffffffffffff9c, &(0x7f00000030c0), 0x1c5140, 0x0) ioctl$SIOCSIFHWADDR(r14, 0x8924, &(0x7f0000003100)={'rose0\x00', @multicast}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000003240)={@fallback=r0, 0x7, 0x1, 0x7, &(0x7f0000003140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000003180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000031c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000003200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000032c0)=@o_path={&(0x7f0000003280)='./file0/file0\x00', r9, 0x4000, r12}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000003300)='\xbb\xbb\xbb\xbb\xbb\xbb') r15 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003380)={r15, r2, 0x0, 0x25, &(0x7f0000003340)='blkio.bfq.io_service_bytes_recursive\x00'}, 0x30) getpid() 11m9.725161838s ago: executing program 5 (id=5624): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140)=0xffffffffffffffff, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000040000000a"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 11m9.419366512s ago: executing program 1 (id=5626): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000004b9a2e0cae789efc6243cee2caa89e559c17d1bd580ec2786d4886c6ce4df804c4b215cf20b14557e8046e5ced958566e3b17f9522d18af57e865dcded7ee97e9c5a5fe52441c88a93dc004cdf638af7ec06c0deb9806dc2ad5f9e4e036ce22d9bd70e4ecfb51f4ca4796115f507082fb3ebc84c5e50cd5d2759b903", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x2}, 0x94) 11m9.359018407s ago: executing program 1 (id=5628): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESOCT=r0, @ANYBLOB="d4172c73bdb51e84f9b6585acb4c1164a1c568e9a39bf5673bbfb219d086239d6f8537fc2d896de7b979cf6e7c2a39ba9ce1b559081b2fd70f763d1ce93620138b0c301cf9b1c607d4db877d25aaf0df8e7d5a769ea71347c0fe"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000000), &(0x7f0000000040)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x30120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffffff, 0x6}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_devices(r1, &(0x7f00000004c0)={'b', ' *:* ', 'm\x00'}, 0x8) write$cgroup_subtree(r10, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8982, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0xe}]}, {0x0, [0x2e, 0x61, 0x30]}}, &(0x7f0000000540)=""/63, 0x29, 0x47, 0x1, 0x8, 0x10000}, 0x28) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11m9.292741742s ago: executing program 2 (id=5629): syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000ae000000b703000007000000850000000e000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r2}, 0x38) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x2000000, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, 0x0) (async) socketpair(0x2, 0x5, 0x84, &(0x7f0000000040)) (async) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0xff, 0x5, 0x0, 0x2, 0x44c04, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x8}, 0x0, 0xc8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) close(r6) 11m9.276273353s ago: executing program 1 (id=5630): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='memory.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r2, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000180)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0, 0xd6, &(0x7f0000000300)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x1e, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 11m9.211519748s ago: executing program 2 (id=5631): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x21, &(0x7f0000000540), 0x4) recvmsg(r2, &(0x7f0000000500)={&(0x7f00000017c0)=@alg, 0x80, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/158, 0x9e}], 0x1, &(0x7f0000000480)=""/63, 0x18}, 0x2020) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x0, 0x2101}, 0x50) socketpair(0x2a, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x8000c, 0x8}, 0x410, 0x2000001, 0xfffffffc, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r7) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) 11m8.614670416s ago: executing program 5 (id=5634): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x50) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)={0xffffffffffffffff}) r2 = gettid() sendmsg$unix(r1, &(0x7f0000001380)={&(0x7f00000010c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001040)=[{&(0x7f0000001140)="38f811e05231164b5156c57bae28bb86845efc3a40a29f6719e66f82ecc405ed0b89b1ce055f051d36cafe0dc50cfebae8cf22813fcd4e7dae97bfa6bb26745aa954d043091a98", 0x47}, {&(0x7f00000011c0)="23d97a145aa6ec194674725f3e0784e932a2c3adb5d83cde93c4dddbaa559d6535c23b4da79c60035a607d6cbdbecacfb2b3ba718d0f0a998999c708c94ee45ca5b5dbfeec84ef5bb89df3b921e0e5e099a528772c3d58d0329fd0d0529e21470df66a19177d2448b97a38616c3120bc2afd8a579f904ebdf15fb303104c5e24df68c082fff8fe3d1d2848f300f213ef42a204edde33c6c7a205e14f16a467d9ede36694e589406df895126cda62fc2220574dcc9653dcd78fd8a4965646737ca394761177a585bc4bd6f0cb06358ccb1f70f8b165ca2b624026d0f025476186", 0xe0}], 0x2, &(0x7f0000001340)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee00}}}], 0x20, 0x24000000}, 0x80000) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000780)="f079ff58f8c819496bb0dfafa460ff97064bc666e29c0559fc951473d760207fabc474400c2dc7ac6048b3e9e8a7dbdd09052cadaf4e725d08167c96afee53abc87c69e2900da044dea326baf23ba69bb73cd08abca51e570386d35553efded5326662ef29053f03b80fc5fda130242fcdbdc84203e7471b784e7a11b9", 0x7d}, {&(0x7f0000000840)="86accc516f0f8261b29c7ecd20e52203e3fe6430d20537dcb98bfd6d2e26591a0fea7841c33d231dc966b10b1336612c72639691bb69e67758f5ffa45420a115db9fbcd4dae8ab686f01ac586c52aba424656da62579a9ba73e7e2d28c079de4b89c3d9c51b02dc07b20d7157873dd0582dc6ccc4ca63db5c301609aae0d", 0x7e}], 0x2, &(0x7f0000000900)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff}}}], 0x20, 0x4}, 0x20000081) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={0x0, 0x0, &(0x7f0000004340)}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={0x0, 0xffffffffffffffff, 0x0, 0x800}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x50) (async) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x50) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) 11m8.613494666s ago: executing program 1 (id=5635): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext, 0x20, 0x3}, 0x0, 0x0, r4, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r7, &(0x7f0000000080), &(0x7f00000002c0)=""/218}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff000000820c0200", @ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00a300"/21], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000380), 0x12) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 11m8.607251386s ago: executing program 2 (id=5636): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x9, 0xae, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x200}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000000480)={0x0, r0}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xc53a}, 0x0, 0x0, 0x7f, 0x2, 0x0, 0xf, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000f80)={&(0x7f0000000d80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd2, 0xd2, 0x7, [@volatile={0x1, 0x0, 0x0, 0x9, 0x4}, @const={0x4, 0x0, 0x0, 0xa, 0x4}, @union={0x2, 0x8, 0x0, 0x5, 0x0, 0x0, [{0x9, 0x4, 0x9}, {0x1, 0x5, 0x8e}, {0x8, 0x2, 0xfa39}, {0x1, 0x5, 0x10}, {0xc, 0x4, 0x8d}, {0x8, 0x1, 0x7}, {0x6, 0x5, 0x8}, {0x2, 0x0, 0x3}]}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x37, 0x0, 0x7a}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @datasec={0x7, 0x2, 0x0, 0xf, 0x2, [{0x2, 0xa815, 0x3}, {0x5, 0x7, 0x9}], "e4ca"}, @typedef={0xb}]}, {0x0, [0x61, 0x61, 0x5f, 0x61, 0x5f]}}, &(0x7f0000000e80)=""/204, 0xf3, 0xcc, 0x1, 0x91e}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000010c0)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1ff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000700)='GPL\x00', 0x9, 0x2f, &(0x7f0000000740)=""/47, 0x41000, 0x20, '\x00', 0x0, 0x1c, r6, 0x8, &(0x7f0000000fc0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001000)={0x1, 0x7, 0x1, 0x8}, 0x10, 0x18bf1, r4, 0x1, &(0x7f0000001040)=[r3, r2, r2], &(0x7f0000001080)=[{0x1, 0x5, 0x3, 0xc}], 0x10, 0x7}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000000c0)=r7, 0x4) sendmsg$inet(r9, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r11}, 0x10) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r12}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0xc8, 0x2, 0x7, 0x0, 0x10001, 0xa}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r13}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r15) recvmsg$unix(r14, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r16, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032b00fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10, 0x0, 0x200003}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe40, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x6b, 0x60000000}, 0x2c) 11m8.488778976s ago: executing program 4 (id=5639): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x5d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x8b}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$TUNSETQUEUE(r7, 0x400454d9, 0x0) 11m8.415261992s ago: executing program 4 (id=5640): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x1a, 0x20, &(0x7f0000000f40)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000d960300ffff00001837000004000000000000000000000041540001fcffffffb7080000000000007b8af8ff00000000b7080000ff0100007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000020000008500000085000000b700000000000000950000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) (async) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}]}, 0x1f00) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) (async) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYRES8=r6], &(0x7f00000007c0)='syzkaller\x00'}, 0x94) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280010927ea341442fdabbff4f98ea3c1eb7d9e7968e00000b0000000e0000e123ee873e0035f7000900000000000009000000338ae57200000000"], &(0x7f0000000340)=""/27, 0x4b, 0x1b, 0x0, 0x67c, 0x10000}, 0x28) (async) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x8, 0x18}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r7, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0], 0x0, 0xda, &(0x7f0000000700)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000740), &(0x7f0000000800), 0x8, 0xf5, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x800, 0x6, 0xd54, 0x20000, r9, 0x8, '\x00', r10, r8, 0x4, 0x5, 0x1, 0x9}, 0x50) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair(0x2, 0x5, 0x84, &(0x7f0000000040)) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 11m8.401485952s ago: executing program 4 (id=5641): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x55f74770b1747d2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 11m8.346591647s ago: executing program 5 (id=5643): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x50) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001340)={r2, 0xe0, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000fc0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb0, &(0x7f00000011c0)=[{}], 0x8, 0x10, &(0x7f0000001200), &(0x7f0000001240), 0x8, 0x6b, 0x8, 0x8, &(0x7f0000001280)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000400)=ANY=[@ANYRESHEX=r5, @ANYRES32=r4, @ANYRESHEX=r4], &(0x7f00000004c0)='GPL\x00', 0x6a, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000005c0)='kfree_skb\x00', r8}, 0x18) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r10}, 0x10) close(r6) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5bd, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0}, 0x94) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000100000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000200000e096ffff0000e29643aa383d4b1d09c3000000000000008000be4da2bfd73d96ef2049a0780f43e123697c90aae8a44e85454acd6dc7a138fffa95f3cb1380f5c870f90fede58bd64a81d1ef449d9f30a89509e553338dea2eb1fce55fcd1d52455743c59967eedac822d9d8ab64"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) 11m8.230704987s ago: executing program 2 (id=5644): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x730, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) (async) close(r0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000005000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000010100007b8af8ff00000000bfa200000000000007020003000008000000b70400000000000085000000430000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000005000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000010100007b8af8ff00000000bfa200000000000007020003000008000000b70400000000000085000000430000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[], 0x0, 0x46}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180), 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000004000000230500000100000000000000", @ANYRES32, @ANYBLOB="a813ca13e9f6c17b5a00200000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000004000000230500000100000000000000", @ANYRES32, @ANYBLOB="a813ca13e9f6c17b5a00200000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000280), 0x6, r5}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000280), 0x6, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0500000000000000b7080000000000007b8af8ff000000b50ba200000000000007020000f8ffffffb703000008000000b704000000000056884cfe635200850000000340000095000000000000008d035ade3e80744e9e067545b1f6683fdaf923fc69cef20700000017ddd4dde20358f839c6a880905522bb3473642c086fae4e79111a0294a69d6e48d844d1bd0aca79f892a8490b8b5912840404a4"], 0x0, 0x20000, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000180)=r6, 0x4) sendmsg$inet(r8, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000041) (async) sendmsg$inet(r8, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000041) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 11m8.19089378s ago: executing program 4 (id=5645): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000003c0)=r2}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d80)=ANY=[], 0x48) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000008000000060000000000000e010000000000000000000000010000060400000006000000000000000000000000005f005d8819de4d1ec8c0843d21"], &(0x7f00000001c0)=""/131, 0x44, 0x83, 0x1}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa2, 0x0, 0x0, 0x10, &(0x7f0000000300), &(0x7f0000000540), 0x8, 0x31, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="1e000000a01200000a000000fc69ab7703000000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=r7, @ANYRES32, @ANYBLOB="0500000003000000040000000900000000040000000000000000000051821454d5329f77df6f85e7696506756e88e46a69d5d965fcf43726b5ab913b5848f6831ae0e9866c6dc892d97c61073da82f0bbd2994d8f5f630ee02538ff6d319b3dc3975ea0e78232e5c23b5670af7b70fec1d8b9d6c9c40d49039dbaf6031a88a86258191496700c61a4e80751a3eb3984f993ffad79b4600"/161], 0x50) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x17, &(0x7f0000000ac0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, @exit, @call={0x85, 0x0, 0x0, 0x53}, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x823}, @ldst={0x0, 0x3, 0x4, 0xb, 0xa, 0x8, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000980)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000001140)=""/4096, 0x40f00, 0x4, '\x00', r7, 0x1c, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2ecfc, r4, 0x4, &(0x7f0000000b80)=[r8, r8], &(0x7f0000000bc0)=[{0x5, 0x4, 0x8, 0xc}, {0x4, 0x3, 0xe, 0x5}, {0x5, 0x4, 0x6, 0x5}, {0x1, 0x3, 0xa, 0x4}], 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000580)='kmem_cache_free\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000140)='./file0\x00', r10}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r12}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r13}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x33}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000003000000180100002020692500000000002020207b1af8ff00000000bf9500000000000007010000f8ffffffb702000008000000b703000001010000850000000600000095000000000000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', r7, 0x18, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xc4ca, r4, 0x4, &(0x7f0000000280)=[r5, r5, r5, r5], &(0x7f0000000340)=[{0x5, 0x4, 0xa}, {0x2, 0x5, 0xe, 0xa}, {0x5, 0x2, 0xd, 0x8}, {0x2, 0x5, 0x6, 0x4}], 0x10, 0x7fff}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r2, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x62, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000580), &(0x7f00000007c0), 0x8, 0x67, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x16, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0xc}, [@alu={0x4, 0x0, 0x8, 0x7, 0x6, 0x20, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @call={0x85, 0x0, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000080)='GPL\x00', 0x9, 0x8d, &(0x7f0000000640)=""/141, 0x41000, 0x28, '\x00', r7, @fallback=0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x2, 0x3, 0x32a}, 0x10, r14, r2, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000005c0)='kfree_skb\x00', r15}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 11m8.139544384s ago: executing program 5 (id=5646): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0xffffffffffffffff, 0x1, 0x10}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4f, &(0x7f0000000540)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xc, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) (async) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xcc, 0xcc, 0xb, [@float={0xa}, @enum64={0x10, 0xa, 0x0, 0x13, 0x0, 0x5, [{0xb, 0x1, 0x7b0}, {0x1, 0xfffffff5, 0x4}, {0x8, 0x0, 0x93d}, {0x10, 0x786cfa93, 0x5}, {0x4, 0x63, 0x10}, {0xb, 0xa}, {0x4, 0xc, 0xdb76}, {0x5, 0x2, 0x654c}, {0x5, 0xffffffff, 0x6}, {0xc, 0x0, 0x4}]}, @const, @union={0x4, 0x1, 0x0, 0x5, 0x0, 0x9, [{0xd, 0x2, 0x2}]}, @float={0xb, 0x0, 0x0, 0x10, 0x2}, @volatile={0x1, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x61, 0x61, 0x30, 0x0, 0x30, 0x0, 0x2e, 0x30, 0x41]}}, &(0x7f0000000880)=""/12, 0xef, 0xc, 0x1, 0xb171}, 0x28) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r5, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x1ff, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r9, @ANYBLOB="0000000000000000b7020000010000008500"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x1b, 0xe, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @alu={0x7, 0x1, 0x3, 0x0, 0x8, 0x10}]}, &(0x7f0000000400)='GPL\x00', 0x1, 0x3a, &(0x7f0000000440)=""/58, 0x41100, 0x40, '\x00', r3, @fallback=0x25, r4, 0x8, &(0x7f0000000900)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000940)={0x4, 0x0, 0x8, 0xd36}, 0x10, r8, 0xffffffffffffffff, 0x7, &(0x7f00000009c0)=[0xffffffffffffffff, 0xffffffffffffffff, r9, 0x1, 0x1], &(0x7f0000000a00)=[{0x5, 0x1, 0xd, 0x8}, {0x5, 0x2, 0x4, 0x4}, {0x1, 0x4, 0xb, 0x4}, {0x1, 0x1, 0x9}, {0x0, 0x4, 0xb, 0x3}, {0x5, 0x4, 0x4, 0xc}, {0x3, 0x3, 0x9}], 0x10, 0x2}, 0x94) (async) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x1}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x2b}]}, &(0x7f00000000c0)='GPL\x00', 0x9987, 0x79, &(0x7f0000000100)=""/121, 0x41000, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)=@o_path={&(0x7f0000000000)='./file0\x00', r10, 0x4000, r1}, 0x18) close(r1) 11m8.06249007s ago: executing program 5 (id=5647): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x102, 0x0, 0x2, 0x0, 0x0, 0x4f}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0x10, 0x1}]}}, 0x0, 0x26}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYRESDEC=r0], 0x128}, 0x20000080) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="1800"/16, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x6, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000080)='syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup(r6, &(0x7f00000000c0)='syz1\x00', 0x1ff) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000004000000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0xfcdcb1087ad3ffd2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\t\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 11m7.905661442s ago: executing program 4 (id=5648): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"/487], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r1}, &(0x7f0000001c00), &(0x7f0000001c40)=r2}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0xe, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c77db71454dd123f16aa96d98c41b841e18c13f247be81429dd0fe5ab44b8ec05320f994ca6b8fc1695112b2e26bfdfc3da565ae2f804762c4b98c49ff83171af04e02b9446a25b60028c605edea589b4eac69b64d8d1b768a7a3b4a0b567969fcace7d239b6a904d99573e44b9d0d3e3a4e0137b9e46ce2628c055c5af3441fd1d0fa9650d7b565bfeac2e81902e4275bff1ef8db4036491bda42159db4d0e5b497ad6c58939dd973af75e297ac33e9cc6151080f918a9f05ac1df5c0f9e3b816ec2508487b53b29c6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x2c04) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57bea000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_config_ext={0xfb}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0xff}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="183c150000b51d1b960000000000000071123b000000f5de24265db7320aa99d544a4400009500f70000000000a72ecd839e0ece4a554fbff5f00820bdaf5a8d2540110e143eefa07c3284f99c0200000000000000acea96b3e9fda04f51761e02b1f4bc4dfe5c99f1a50101f361d5839fcb2d52c72ed8cb473135a970abbe10ab468e51c6259010b979b03bdca171aa5c3ee8fbc89c189ddb0c80f0480c9e31e9c3f37f0e1be0"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x87) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 11m7.602831876s ago: executing program 4 (id=5649): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x25, 0x1000, &(0x7f0000000180)="bdc6bda56beb01aa5d81b0477449eeed2bc4d754c88f73d6fd64341c24d17d717a84296c23", &(0x7f0000000580)=""/4096, 0x0, 0x0, 0xf5, 0x8e, &(0x7f0000000200)="f845051548b9f077712b0bd104f1aeb539ef39785406b6a4527da84ff79023cf77d63dfceb43ad72c42eb525ad4dea06764c194f6156f1d0b7dc39ea2266745cc690cdc79772c82c7afa94be7d4d346591e83cd712b05b26960dd8fa0a38a860a7d79e579653eb15ebe0b04f22b44d26ce3f61ced7189e05d2ab26d0464e10339cc81179c3b581ab30cb3af011430ecee0cccbc64b1577fa73f41d7d18deb5cdfe66a6f71315ebbf825f7db65bd68956634b4ceab3bbc409b457534ded5c7032fefff3714271f014ec6cd459e40b2afe8716aad6f1687b717c6900b3f4ccd9b03aac18bf8f55485627a6ae8abf666ab3a58306e4e3", &(0x7f0000001580)="70eca135d3d63aced029d2d62e52ecef600563f1c361608eceb53f59127eb66f9c4ad0a8aa29c36baa468f259b5a695cd92dd643097a1ccdec35918a4a5ced32375325a6203a8ca17cc3b0ca334ef287142f944511f12b255076b7b17f5afe33292e7eca887fbb1aa939b2d365adc7159b3d7f62fb43e6cdf6de4aa59c1f90920e3e8281216623ba04a9b9b29d2b", 0x5, 0x0, 0x5f14}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000000)={'veth0_to_bridge\x00', 0x400}) write$cgroup_devices(r5, &(0x7f0000000180)=ANY=[], 0xffdd) 11m7.55739194s ago: executing program 2 (id=5650): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0xdd, 0xa}, 0x50) close(0x3) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000080000000050000000010"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x75, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x9c}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 11m7.540748671s ago: executing program 2 (id=5651): openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.max_usage_in_bytes\x00', 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$TOKEN_CREATE(0x24, &(0x7f00000005c0)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x3, 0xc, &(0x7f0000000600)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r1}, 0x38) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x1, 0x7, 0xf9, 0xb, 0x0, 0x401, 0x800a8, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x14181, 0x80, 0x4, 0x2, 0x6, 0x1, 0x6, 0x0, 0x6c, 0x0, 0x8}, 0x0, 0x10, r0, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000087123f00000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000003c0)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r0, 0x58, &(0x7f0000000740)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x33) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r5}, 0x10) unlink(0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r6}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x9, 0x0, 0x6, 0x0, 0x2, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 10m45.946562265s ago: executing program 33 (id=5652): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) r1 = getpid() r2 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0xe, 0x7f, 0x1, 0x1, 0x0, 0xfffffffffffffc00, 0x20101, 0x6, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x40, 0x0, @perf_config_ext={0x7}, 0x1b0, 0x6, 0x80, 0x4, 0x4, 0xfc, 0x8, 0x0, 0x8, 0x0, 0x5}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x5, 0x8, 0x3, 0x8, 0x0, 0x5, 0x80000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xda, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x280, 0x7, 0x6, 0x7, 0x800, 0x1ff, 0xfffe, 0x0, 0xfff, 0x0, 0x200}, r1, 0xffffffffffffffff, r2, 0x2) unlink(&(0x7f00000001c0)='./file0\x00') r4 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x8, 0x6, 0xb6, 0x2, 0x0, 0xa877, 0x400, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfbc9, 0x2, @perf_bp={&(0x7f0000000200), 0x4}, 0x4000, 0x5, 0x8, 0x3, 0x9, 0x4, 0x2, 0x0, 0x101, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r3, 0xa) r5 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)={[{0x2d, 'devices'}, {0x2d, 'rlimit'}, {0x0, 'memory'}, {0x2d, 'pids'}]}, 0x1f) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6c, &(0x7f0000000680)=[{}, {}], 0x10, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x36, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000940)={0x401, 0x0}, 0x8) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_tracing={0x1a, 0x9, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb5c5, 0x0, 0x0, 0x0, 0x3}, [@cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffff8}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xc}, @exit, @ldst={0x3, 0x0, 0x6, 0x5, 0xa, 0x10, 0xfffffffffffffff0}]}, &(0x7f0000000a00)='syzkaller\x00', 0xdb5, 0x2b, &(0x7f0000000a40)=""/43, 0x41000, 0x0, '\x00', 0x0, 0x18, r0, 0x8, &(0x7f0000000a80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x5, 0x4, 0x9, 0x5}, 0x10, 0x23f0a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1e, 0x1b, &(0x7f0000000400)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffff8}, @ldst={0x3, 0x0, 0x0, 0x1, 0x3, 0x0, 0xc}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7ff}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7f}}, @exit, @map_idx={0x18, 0x2, 0x5, 0x0, 0xe}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000500)='GPL\x00', 0x20, 0x4a, &(0x7f0000000540)=""/74, 0x41000, 0x15, '\x00', r7, @sk_lookup=0x24, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000900)={0x1, 0xd, 0x5, 0x59d0}, 0x10, r8, r9, 0x4, &(0x7f0000000bc0)=[r0, r0, r0], &(0x7f0000000c00)=[{0x4, 0x4, 0x6, 0xc}, {0x1, 0x5, 0x5}, {0x1, 0x4, 0x9, 0x2}, {0x1, 0x1, 0xd, 0x4}], 0x10, 0x5}, 0x94) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000d40)={0x0, &(0x7f0000000d00)}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000d80)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002dc0)={r0, &(0x7f0000000dc0)="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", &(0x7f0000001dc0)=""/4096}, 0x20) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000002e00)) r10 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000002e40)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000002e80)=r1, 0x12) bpf$TOKEN_CREATE(0x24, &(0x7f0000002ec0)={0x0, r3}, 0x8) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000002f00)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002f40)={[{0x2b, 'hugetlb'}, {0x2b, 'net'}, {0x2b, 'cpuacct'}, {0x0, 'blkio'}, {0x2b, 'hugetlb'}]}, 0x27) write$cgroup_subtree(r5, &(0x7f0000002f80)={[{0x2d, 'pids'}, {0x2b, 'freezer'}, {0x2d, 'rdma'}]}, 0x15) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000002fc0)='syz0\x00', 0x200002, 0x0) r12 = openat$cgroup_ro(r11, &(0x7f0000003000)='blkio.bfq.io_queued\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003040)) bpf$LINK_DETACH(0x22, &(0x7f0000003080)=r12, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r12) openat$cgroup_pressure(r11, &(0x7f00000030c0)='cpu.pressure\x00', 0x2, 0x0) 10m45.930728766s ago: executing program 34 (id=5635): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext, 0x20, 0x3}, 0x0, 0x0, r4, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r7, &(0x7f0000000080), &(0x7f00000002c0)=""/218}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff000000820c0200", @ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00a300"/21], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000380), 0x12) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 10m45.902526418s ago: executing program 35 (id=5651): openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.max_usage_in_bytes\x00', 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$TOKEN_CREATE(0x24, &(0x7f00000005c0)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x3, 0xc, &(0x7f0000000600)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r1}, 0x38) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x1, 0x7, 0xf9, 0xb, 0x0, 0x401, 0x800a8, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x14181, 0x80, 0x4, 0x2, 0x6, 0x1, 0x6, 0x0, 0x6c, 0x0, 0x8}, 0x0, 0x10, r0, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000087123f00000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000003c0)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r0, 0x58, &(0x7f0000000740)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x33) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r5}, 0x10) unlink(0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r6}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x9, 0x0, 0x6, 0x0, 0x2, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 10m45.88683774s ago: executing program 36 (id=5647): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x102, 0x0, 0x2, 0x0, 0x0, 0x4f}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0x10, 0x1}]}}, 0x0, 0x26}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYRESDEC=r0], 0x128}, 0x20000080) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="1800"/16, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x6, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000080)='syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup(r6, &(0x7f00000000c0)='syz1\x00', 0x1ff) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000004000000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0xfcdcb1087ad3ffd2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\t\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 10m45.843714183s ago: executing program 37 (id=5649): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x25, 0x1000, &(0x7f0000000180)="bdc6bda56beb01aa5d81b0477449eeed2bc4d754c88f73d6fd64341c24d17d717a84296c23", &(0x7f0000000580)=""/4096, 0x0, 0x0, 0xf5, 0x8e, &(0x7f0000000200)="f845051548b9f077712b0bd104f1aeb539ef39785406b6a4527da84ff79023cf77d63dfceb43ad72c42eb525ad4dea06764c194f6156f1d0b7dc39ea2266745cc690cdc79772c82c7afa94be7d4d346591e83cd712b05b26960dd8fa0a38a860a7d79e579653eb15ebe0b04f22b44d26ce3f61ced7189e05d2ab26d0464e10339cc81179c3b581ab30cb3af011430ecee0cccbc64b1577fa73f41d7d18deb5cdfe66a6f71315ebbf825f7db65bd68956634b4ceab3bbc409b457534ded5c7032fefff3714271f014ec6cd459e40b2afe8716aad6f1687b717c6900b3f4ccd9b03aac18bf8f55485627a6ae8abf666ab3a58306e4e3", &(0x7f0000001580)="70eca135d3d63aced029d2d62e52ecef600563f1c361608eceb53f59127eb66f9c4ad0a8aa29c36baa468f259b5a695cd92dd643097a1ccdec35918a4a5ced32375325a6203a8ca17cc3b0ca334ef287142f944511f12b255076b7b17f5afe33292e7eca887fbb1aa939b2d365adc7159b3d7f62fb43e6cdf6de4aa59c1f90920e3e8281216623ba04a9b9b29d2b", 0x5, 0x0, 0x5f14}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000000)={'veth0_to_bridge\x00', 0x400}) write$cgroup_devices(r5, &(0x7f0000000180)=ANY=[], 0xffdd) 9m2.270231261s ago: executing program 3 (id=6886): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000000800000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000680)='syzkaller\x00'}, 0x6b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r8], 0x18, 0x10}, 0x0) close(r7) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000005000000000000010018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x18) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8000000c8, 0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x40, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x12) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6334ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfdef) 9m1.681591608s ago: executing program 3 (id=6889): perf_event_open(&(0x7f00000014c0)={0x1, 0x80, 0x0, 0xff, 0xff, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x5, 0x2}, 0x80, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) perf_event_open(&(0x7f00000014c0)={0x1, 0x80, 0x0, 0xff, 0xff, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x5, 0x2}, 0x80, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x0, 0x0, 0x0, 0x2}]}}, 0x0, 0x26}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x9, 0x8, 0x8, 0x90, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x1, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/net\x00') 9m1.590633346s ago: executing program 3 (id=6891): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x10, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000014}, 0x4000054) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) close(r6) close(r5) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001040)={&(0x7f0000001280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@ptr={0x2, 0x0, 0x0, 0x2, 0x5}, @restrict={0x10, 0x0, 0x0, 0xb, 0x3}, @fwd={0x2}]}, {0x0, [0x5f, 0x61, 0x0]}}, &(0x7f0000001300)=""/91, 0x41, 0x5b, 0x1, 0x0, 0x10000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r10, 0xe0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001400)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x57, &(0x7f00000014c0)=[{}], 0x8, 0x10, &(0x7f0000001500), &(0x7f0000001540), 0x8, 0x75, 0x8, 0x8, &(0x7f0000001580)}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={&(0x7f00000028c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000038c0)={0x30, 0x11, &(0x7f0000001100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@jmp={0x5, 0x1, 0xb, 0x1, 0x5, 0xffffffffffffffc0}, @jmp={0x5, 0x0, 0x8, 0xa, 0x3, 0x40, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001000)='syzkaller\x00', 0x8, 0x89, &(0x7f00000011c0)=""/137, 0x40f00, 0x42, '\x00', 0x0, @fallback=0x25, r11, 0x8, &(0x7f0000001380)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000013c0)={0x0, 0x4, 0x1ff, 0x4}, 0x10, r12, 0xffffffffffffffff, 0x0, &(0x7f0000001780), 0x0, 0x10, 0x6}, 0x94) 9m1.474460164s ago: executing program 3 (id=6895): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000a000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) 9m1.309198578s ago: executing program 3 (id=6899): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='@\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="fffffffffffffffffeffffff00"/28], 0x1b) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0xc188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e48848"], 0xfdef) r9 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) close(r9) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT=r12, @ANYRESOCT, @ANYRES16=r11, @ANYRESHEX=r1, @ANYRESHEX=r4, @ANYRES64=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x32, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r14}, 0x10) r15 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r15}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r8}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r10}, &(0x7f0000000180), &(0x7f00000001c0)=r9}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r5, 0x20, &(0x7f0000000200)={&(0x7f0000000140)=""/56, 0xfffffffffffffe9e, 0x0, &(0x7f0000000180)=""/94, 0x5e}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 9m0.39426578s ago: executing program 3 (id=6904): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/94}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000980)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x4, 0x0, 0x1, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0xfffffffffffffdad) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r5 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_pid(r5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000007112130000000000950000000000000048e4a7b300c4869dc1adc3bc3be4a896049fa2db42b2b70484bb23fdc7dff36a7d3b66f0a81eee01aa695c3226bab43145d855785c3eb2bfe6d0eb345c0b06379d1092fd6cf3dd1495b62316e66b229e24cda68e6179f75ca356328bae37ef45513aaf6278bcc12f96623e070480178bcf7fc96f6c9316cfa08f5d301474f8ac"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x18) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 8m45.032313759s ago: executing program 38 (id=6904): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/94}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000980)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x4, 0x0, 0x1, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0xfffffffffffffdad) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r5 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_pid(r5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000007112130000000000950000000000000048e4a7b300c4869dc1adc3bc3be4a896049fa2db42b2b70484bb23fdc7dff36a7d3b66f0a81eee01aa695c3226bab43145d855785c3eb2bfe6d0eb345c0b06379d1092fd6cf3dd1495b62316e66b229e24cda68e6179f75ca356328bae37ef45513aaf6278bcc12f96623e070480178bcf7fc96f6c9316cfa08f5d301474f8ac"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x18) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 3.246404663s ago: executing program 7 (id=13164): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000bc0)=@bpf_lsm={0x1d, 0x19, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x240000, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @alu={0x4, 0x1, 0x7, 0x4, 0x7, 0xc, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x11}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='GPL\x00', 0x3, 0xee, &(0x7f00000008c0)=""/238, 0x41100, 0x47, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x1, 0x5, 0x4, 0x1ff}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000b00)=[r0, r0, r0, r0], &(0x7f0000000b40)=[{0x1, 0x1, 0x10, 0x8}, {0x3, 0x2, 0xc, 0xa}, {0x3, 0x1, 0x5, 0x5}, {0x4, 0x4, 0x1, 0x61bc42e2ac231492}, {0x0, 0x4, 0x1, 0x4}, {0x2, 0x5, 0x10, 0xa}, {0x1, 0x3, 0xa, 0xf}, {0x3, 0x3, 0x0, 0x1}]}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000f00)='kfree\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f0000000840)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x80, 0x4, 0xc8, 0x40, 0x0, 0x3, 0x30004, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_bp={0x0, 0x4}, 0x10040d, 0x8, 0x54, 0x6, 0x6, 0x0, 0x4, 0x0, 0xa2e, 0x0, 0x4}, 0x0, 0xf, r5, 0x2) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7c2f682f, 0xe1}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) close(r3) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16=r2], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r8}, 0x10) socketpair(0x2b, 0x0, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x3}, 0x8) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x80, 0x6, 0x5, 0x1, 0x4, 0x0, 0x2, 0xa000, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10, 0x88f}, 0x80, 0x8, 0x1b35, 0x3, 0xef7, 0x88, 0xffe, 0x0, 0x80000001, 0x0, 0x97c}, r6, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1801000000001f00000000000000ea1f850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) getpid() 2.704316835s ago: executing program 7 (id=13170): r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x600000, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000100)=r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x1) socketpair(0x1e, 0x6, 0xfffffffc, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x17, 0x4, 0x6, 0x5, 0x60001, r4, 0x80000001, '\x00', r6, r4, 0x2, 0x2}, 0x50) write$cgroup_subtree(r4, &(0x7f0000000300)={[{0x2d, 'devices'}]}, 0x9) ioctl$TUNGETVNETBE(r4, 0x800454df, &(0x7f0000000340)) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfffffffb, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x50) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='cdev_update\x00', r4, 0x0, 0x643}, 0x18) r10 = syz_open_procfs$namespace(r1, &(0x7f0000000480)='ns/net\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r1, r4, 0x0, 0x8, &(0x7f00000004c0)='!:!@]-@\x00'}, 0x30) openat$ppp(0xffffffffffffff9c, &(0x7f0000000540), 0x430001, 0x0) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r4, &(0x7f00000005c0), 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000600)=r11, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = openat$cgroup_subtree(r4, &(0x7f0000000b40), 0x2, 0x0) sendmsg$unix(r5, &(0x7f0000000c40)={&(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000a80)=[{&(0x7f00000006c0)="de36fd06a29780195609ee86a6bbcd637963c589fb5123cb1744ddbd5b0ee7d5a48bed990ff089adabc191b39d6bb9061ba8eca602eccd11ed8fbb89b5915669e9d63580e84ccbc1882bd255f695e2a8036b9269020519c84ce0f82946895f04370535aea1eb373b51705f4607355eb623164c55b505f1c7568222804b1ac55d474bedb7800c7cbf64cd73ecb200da6d7e3d6afdc9cce1a8847aa68aaf8f", 0x9e}, {&(0x7f0000000780)="6f2ca6830e7d83af391d6bd07edd5147c8ca008e47b681cc50f3d12e396d16c04679d5c18b12ee6f2c4530cc962fb9541c5f5a1d251fb0e8e6674c8ded06487df301041c62c15e259bc373be08546b8e258e48c29943f4f3b8a6c0ff145fc12fbab0951f9f35a9b18c30680a0abe9d37909115f009c81a99adf23f5f6846faea1c0e4fbf23d567e63da91ef81beee502d4b17b944eaf707bcf3f017df43046e65fc78013e01ae5b99de519f6299cc137c42ae46b6ae94b4e574188dd38130e3f8d6b7806844a61f7127ff7931062b2c0db585dce8e7a561d76168eda77e5d8b9d9cfb4b5236d481d", 0xe8}, {&(0x7f0000000880)="6752e6cbc710446b7e8fadc0c66371113f403fa22b0b309f83d5fa5b00400da9eb7862aadf9b6661e7e5e3c9e6f40313146bad7958ac235f95", 0x39}, {&(0x7f00000008c0)="0190af04518c9afd8680429c6c7d874a75648db129a63d45ec7c9ec61775a21c10c17213d8e282883ac2e8e6d77820551771e5a6f85adb22913e72e3d759513201df4ee3f9bd1b2489b7ef43b1e38e32024d9c535e7b6086fc94fb607b928ef835328ad81966d094e0846271d42c490d310aab9ee3ff1f4fdd2e65bb81d8c05c70056749a84b037780867984bc7fcfc0dc9475d4d2a0c87a", 0x98}, {&(0x7f0000000980)="cc7beb833f543ddde744ab9c8d72041767ca294f62a6d4cfdb067be6063ead74684e573b2617af29b3fa937e0080a57fd1a183355bd8d9b683cbbebbd0a2fd912db84a5135ec99b868a622e9420dbe7433a59c9d463bf86954334a7d9ab0154a074d1e213539463a0b487322d18fa502d9648674e01b2310fa1f17eae1497338c2a8e83cec17e95140b10413bc8357796893f91d2796b64b21a3d80b6af866686bf455fccf8f34dcb524d6ac23ea5c3e012a8ddb1d82f4b17d1c67d3db6b028db1cec3d2fe5e477d68e9", 0xca}], 0x5, &(0x7f0000000b80)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01, 0xee00}}}, @rights={{0x1c, 0x1, 0x1, [r12, r9, r9]}}, @rights={{0x18, 0x1, 0x1, [r5, r13]}}, @rights={{0x24, 0x1, 0x1, [r10, r2, r10, r9, r10]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xffffffffffffffff, 0xee01}}}], 0xa0, 0x4000000}, 0x8014) openat$cgroup(r11, &(0x7f0000000c80)='syz0\x00', 0x200002, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000cc0)=0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x18, 0x30, &(0x7f0000000d00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, [@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @call={0x85, 0x0, 0x0, 0x62}, @alu={0x7, 0x0, 0x3, 0x9, 0xa, 0xffffffffffffffe0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x8, 0x4, 0x4, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000e80)='syzkaller\x00', 0x6, 0x0, &(0x7f0000000ec0), 0x40e00, 0x26, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000f00)=[r7, r8], &(0x7f0000000f40)=[{0x4, 0x3, 0xb, 0x8}, {0x4, 0x4, 0xe, 0x6}, {0x3, 0x5, 0x9, 0x6}, {0x3, 0x3, 0xf, 0xa}, {0x0, 0x5, 0x7}, {0x4, 0x1, 0xd, 0x6}, {0x2, 0x1, 0x1, 0xa}], 0x10, 0x4}, 0x94) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000001080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)) 2.612781983s ago: executing program 7 (id=13172): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000140)={0x0, r0}, 0x8) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0xfffffffe, '\x00', 0x0, 0x0}, 0x50) (async) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0xfffffffe, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x40}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000026c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='mm_page_alloc\x00', r4}, 0x10) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x318, 0x0, 0xdb0, 0xf5ffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000200), &(0x7f00000003c0)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r1}, &(0x7f0000000080), &(0x7f00000000c0)=r2}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[], 0xfdef) 2.503642431s ago: executing program 7 (id=13175): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32, @ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x51}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x10000000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r2}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xa, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8912, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000020850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000040)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000090000000011000000000071121d000000000095000000000b0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x129800, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) 1.970798124s ago: executing program 0 (id=13180): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) socketpair(0x15, 0x4, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r3}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b400000000090000dd0a00000000000073015800000000009500000000000000425e494e53a90f38f870e056d03b2010633dee8a3a6601dbd212"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x300}, 0x48) 1.544374588s ago: executing program 7 (id=13188): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000600ffffff00000000000000003b01000020586c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702001008000000b7030000040000018500000000230000009500"/96], 0x0, 0xfffffffe, 0x4e, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000001ac0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'macsec0\x00', @local}) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd2, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0xae31cbdd19173c73, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r2, r1}, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r10 = syz_clone(0x40000, &(0x7f0000000240)="0eacaf97cdab", 0x6, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f00000003c0)="81f3c18f149bd6a037becd84d4a0d61a5e832cf201af5633f688fd0edc3705c5b54c8caa0333f31934447305b68401e34aa5ccdb7a63514b73bf6e98d225588fffaa462f4ff72426758b87d8e25a94df29690c38b8ee7f06624e7ebcbd4cb2cfba9623eb") r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000001940)=ANY=[@ANYBLOB="1887e6403c3ae5ab20000000000018110000ecf005b47b4619a5e447f5c640762b5edb6e8d0180000000000000752d49b863a5bf14dd81d6a58e44c699026cbb34bc4af640ed4c168f53b8f504c3060f3d6d85a9cc4d886cb8bf2df1905ded2dc13a7ca0cd1f1fd72dadbe17a0ba1b47f2d941648b7a72082f0f3249f12b6370d2bd85904dabdcf2cc8567d564b78125f223468bd68de4a17f8c139c2ffdd6fb23edcd5a73c22ee24d00fff7d0ec8d456ce229a1eadc844ddb0342ea9ae278ec8ea8519649df887994e78318a2282e60a839ff21751737fe61c769bceb880e6dea7531ea8d93e420b2c6dc00"/256, @ANYRES32=r11, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xaae9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x50) sendmsg$unix(r8, &(0x7f0000000700)={&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000480)="12f086a68faea128b82807e748a3deebd1b46605934e8b89b5acf4f4de5305ad3bd1959530d14d790570b5d5496b146ce5ded88205a3dcbfbbb5e12ce5a1c9f8e5e936531174a0b77d966985cde2ce1b99a0e02d7a51c9f0d39d5803aaa720b8575f46392b6e57790c677d198d3a9c763fbc6a51466e2191b285ff727549f61a9e4ee8e4f534d24e220d9836a706c40d2d6931a15f60ff636671ab0a8036a8f4422e26ce84e798b79b85b73647cd6271dbe1595d715766e38b96a2ac27bf0ba310aa88ac9254bc1205beec437eb2", 0xce}, {&(0x7f0000000940)="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", 0x1000}], 0x2, &(0x7f0000000600)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r11, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r12, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000018000000000000000000000201000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0xd0, 0x40000}, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 1.476444763s ago: executing program 8 (id=13191): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) mkdir(&(0x7f0000000000)='./file0\x00', 0xbe9bac6d2d0f4e0b) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r3) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@ifindex, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002280)=@generic={&(0x7f0000002240)='./file0\x00', r0}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x200000000}, 0x101000, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='bdi_dirty_ratelimit\x00', r5}, 0x10) r7 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r7, r6, 0x0, 0x1, 0xfffffffffffffffe}, 0x42) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1a003}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file1\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10}, &(0x7f0000000300), &(0x7f0000000340)=r1}, 0x20) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @dev}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) 1.470742824s ago: executing program 6 (id=13192): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r1, @ANYRESHEX=r2, @ANYRES32, @ANYRES8=r1, @ANYRES16=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000080), 0x0}, 0x20) 1.463326054s ago: executing program 9 (id=13193): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffa702000008000000b70300000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0900000001000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000009600867a4100000000000031a873fe0dd1d0fb741dd2760e062dde19929428a04da8c1c6c1b733b83d169d1137f4817591dc18c54e2a7b50e26ce8e79d26d3a4fd0b3ccd1f5202d1dc25cb1cfcc2528f4578be555a11b789b472f2acb52c2f71a1a77d4dbadad6bfe312c59c7d533e1e07ca2bba933f7981ebb4620b83e0b412de707028f30cec252ce33ffc0fb8ebe2c600484c873af6fd79d12dc2d02a", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00'}, 0x10) (async) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00'}, 0x10) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7fff, 0x10000}, 0x4000, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x48069, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x9}, 0x489, 0x0, 0x1, 0x0, 0x0, 0x0, 0x260d}, 0x0, 0xffffffffffffffff, r5, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0900000006d6380241cd733a411228f730047d0024f8a77612e80369ab413861ed65d2c07ad8ada020143d26af08fdbdd767ad82bf92f60073fd0804c2e95644b420c9431602b84e44353f8a4b10c1ac7efd4b68bfe25dc212255858a8116f5f2cb5dfef94a5b6dc872a26fd8f79eaf33d4414884d30f362c2d8000e8889f910d8ab3923cb789d3550a08fee25e43f4e5f1b11cad2c3c1e8c3059ed0c4c7745741d4794485e78f6943dcb32ad53c808efc371a6b55ea43ce4c46ce56202872762691ab5f094091b8d180268186692ad61a9f2efb66f960c4bb02fb8b11a1c5", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@cgroup=0xffffffffffffffff, 0x2b, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0]}, 0x40) (async) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="7a0a00ff00000000711273000000000095000000000000000b7a47e45a91dda781f096395df5ae05eac1e48686a12c86"], &(0x7f0000000480)='syzkaller\x00'}, 0x94) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@cgroup=r8, 0x14, 0x1, 0x1, &(0x7f0000000340)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000006c0)={@cgroup=r9, r0, 0x1e, 0x9, r4, @void, @value=r10, @void, @void, r11}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000880)=ANY=[@ANYRESDEC=0x0, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080072fbf6f14d00000000007b8af8ff00001af1bfa200000000000007020000bf9c254cb7c9e6d103000008000000b70400000051a72b683794ab0c24a2e80ea564000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r7}, 0x38) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r12}, 0x10) 1.400993749s ago: executing program 6 (id=13194): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8004, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4a, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x4a42, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x18) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5c8, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0, 0x0, 0x2000000}, 0x40002001) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xf, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="00000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095000000000000"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', r5, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="0e00000000000000000100000000000000000000127f6319eb1b8bdd1a555292e0b70b33bf48a67ed1f850a4c9a362f6da3e22b09959eb7d6d4b0d4e52b0b853481d8484e7bbb3c63e082e06de44f424e853707a5a6c81c94249b9", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="000000000300"/28], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) close(r3) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, 0x0, 0x0, 0x2}, 0x94) 1.400126679s ago: executing program 9 (id=13195): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ufshcd_clk_scaling\x00', 0xffffffffffffffff, 0x0, 0x8}, 0x18) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_bp={0x0, 0x9}, 0x1c06d, 0x100000000002e, 0xfffffbff, 0x3, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, r1, 0x9) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_bp={0x0, 0x8}, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0xffffffffffffff20}, 0x48) (async) perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x80, 0x80, 0x40, 0x5, 0x6, 0x0, 0xa925, 0x6000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f00000000c0), 0xd}, 0x4200, 0x2, 0x0, 0x2, 0x7fff, 0x1, 0xe4, 0x0, 0x10001, 0x0, 0x7}, 0xffffffffffffffff, 0x2000000000000e, r2, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r7, 0x40047440, &(0x7f00000017c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r5}, 0x10) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r9}, 0x10) (async) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xf, 0x10, 0xe9, 0x9, 0x0, 0xfff, 0x10000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000003, 0x1, @perf_config_ext={0x2, 0x5}, 0x11464, 0x8, 0xa5, 0x9, 0x9, 0xc8e193a, 0x8001, 0x0, 0x7, 0x0, 0xff80000000}, 0x0, 0x4, r3, 0xa) 1.397503939s ago: executing program 9 (id=13196): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x36}, 0x41fe) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791218000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x8, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x12, 0x104, 0x8, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r6, &(0x7f0000000200), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, 0x0, 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r2, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000900)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000056, &(0x7f0000000940), &(0x7f0000000980)=[0x0], 0x0, 0xef, &(0x7f00000009c0), 0x8, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0xb8, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c40)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x9, '\x00', r7, r0, 0x0, 0x1, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) 1.395718639s ago: executing program 0 (id=13197): close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRESOCT=0x0, @ANYRES32=0x0, @ANYRESDEC=r0], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) (async) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.345912203s ago: executing program 8 (id=13198): r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000000000)='./file0\x00', 0x1d) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 1.281095919s ago: executing program 0 (id=13199): bpf$PROG_LOAD(0x5, &(0x7f0000002300)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x40001) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x17, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r4], 0x18, 0x4000}, 0x0) (async) close(r4) (async) recvmsg$unix(r3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)}, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) (async) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) 1.279718269s ago: executing program 8 (id=13200): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x5411, &(0x7f0000000040)={'bridge_slave_0\x00'}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005000000000000", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000672c59637daad62009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)=@o_path={&(0x7f00000008c0)='./file0\x00', 0x0, 0x10, r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r6}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={&(0x7f0000000780)="19ffe8fe238d03bd34c29c4312d3db7683ed8db113dd2677bd98611d893d1e924e1f62730c829f2a1709944d091574758681e3a33d36f3485dd4d1c4af30ca4d9c37df285bb7a2547af6a46b779b1c008671a32793a4c1810d4de2f0fe911476971157ae664f30f62c8822a6976318658833f2ab62979ae128f03f0682747161bc96bc570727097c2322a2f8162822f62c62bbcca0bf8fb5d9bea8c3ccb93f087f070a63cd96635372d60ab9d1f2ce54ab553650d94f01221da0e240830df85aa56d2cd5d18aa7131789f606cb3d4b129d6e109691db768d811f21750bfe8f8daa45d2c631fb6f32f2c2b4ee967a1d4d7cab7eccf974cb55702c", &(0x7f0000000b00)=""/213, &(0x7f00000004c0)="b43099d01b70031880c03d4442a575c8603a1abf9c22923abbb2b2130d6b40cde9ea6865aee322bdb5a8903c3b9d734ccf361f425ba8ffaa9f9f7eb6a682ea36e5c703cbeeeeaa11b22965e7786a593d94c357711591ea3dcdc28505009ae44ba5245b092530e9", &(0x7f0000000080)="c6ce166cb9d3be013f9c68e1627fa543718c76b2db50eba1d49739396d3731c9bb6a18a5a5903772a7e7c0a2e6efbf", 0x2, r0, 0x4}, 0x38) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000006c0)={&(0x7f0000000680), &(0x7f0000000c00)=""/90, &(0x7f0000000c80)="0962905476522ad70c3d101553d7f106b187fb0b4c73667a8f64cc4c13b42fbb81320754073256a8135549f98954fde81bbfeeecff46f390ee0b8d41c7123ab3b7e7641c1827a20507675f06d92f3a16c06cf02d6dfc78b00d0daa42e66039a2190bc1459c90411d5702062f8356f4e3e1958e6c136b02a142b77950e35b1333ffc89eca03802c7b765a31020b16f4801ae451ff69f1000bdb01532128641b7ba538a255a93ff15e0e8956add546f2c381d4c94327838ede6ba80698c8641a35790528ca288389b6e2f244d716f57f2090c3dffc020f3af08966b66db541b4e55b4b99d714753405997bb1487d76", &(0x7f0000000d80)="313352dc4275d20d838873a0f7d206e9b6ce0dd50ae3307c25c621ff31859a260fc4d09b7d700915177cd584cc514a7a5298ca4f7beedfda25470c9ee86ead900f4d77279ac54746f541dc6bc9af24fd4062f474dd450be7fc5bfc32e94ce1b95765c1a05b46aee5a0b52ac9d8e5e62a9de4eb461f6da90b357286bf76745f72811c42b28453077281f7162f5dd66d402a2a3f61fad48b9c4fdeea2d442271b4cc1f2af103a3908822f33fadff03b2386f218e447bfdba2938342e91e882c80b2a8b13d895177aa1e6", 0x7, r7, 0x4}, 0x38) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.226824653s ago: executing program 0 (id=13201): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) 1.00884646s ago: executing program 9 (id=13202): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000003"], 0x48) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r6, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000580)={0xb8, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x15, 0x1c, &(0x7f0000000280)=@raw=[@exit, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @jmp={0x5, 0x1, 0x3, 0x2, 0x0, 0xffffffffffffffc0, 0x4}], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x28, '\x00', r10, @fallback=0x38, r11, 0x8, &(0x7f0000000500)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x4, 0x4, 0x3}, 0x10, r12, 0xffffffffffffffff, 0x2, &(0x7f0000000680)=[r6, r3, r0, r3, r3], &(0x7f00000006c0)=[{0x3, 0x2, 0xb, 0x7}, {0x5, 0x2, 0xe, 0x8}]}, 0x94) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r9) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r13}, 0x10) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 730.311462ms ago: executing program 6 (id=13203): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r2 = perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x8, 0x40, 0x0, 0x0, 0x8000, 0x84254, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x9, 0x3ff}, 0xe2, 0x929, 0x7ff, 0x6, 0x7ff, 0x2e0d, 0xdf, 0x0, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x1) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@o_path={&(0x7f0000000080)='./cgroup/../file0/file0\x00', r0, 0x4000, r3}, 0x18) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0xff}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8a, 0x3, 0x0, 0x3, 0x0, 0x10000000000, 0x8800, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x620, 0xb539}, 0x0, 0x3, 0x0, 0x6, 0x5, 0xffffffff, 0x2, 0x0, 0xffffffff}, 0x0, 0xb, 0xffffffffffffffff, 0x18) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000680)='./cgroup/../file0/file0\x00', 0x109) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000440)=ANY=[@ANYRES16=r5, @ANYRES16=r9, @ANYRES16=r5, @ANYRESOCT=r2, @ANYRES32=r9, @ANYRESOCT=r10, @ANYRES32=r9, @ANYRES16=r3, @ANYRESDEC=r1], &(0x7f0000000600)='GPL\x00', 0x32, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r11}, 0x18) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 691.391375ms ago: executing program 6 (id=13204): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r0, 0x0, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="180000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000000, 0x7, 0x5, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000032000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f00000002c0)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r7}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r6, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r3, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0], 0x0, 0xda, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000640), &(0x7f00000007c0), 0x8, 0x50, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x7, 0xb, &(0x7f0000000380)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0xb78}], &(0x7f0000000040)='GPL\x00', 0x3000, 0x0, 0xfffffffffffffffe, 0x41000, 0x40, '\x00', r8, @fallback=0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0x8, 0x9, 0x1}, 0x10, r9, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000980)=[{0x0, 0x2, 0x0, 0x5}, {0x3, 0x4, 0x9, 0xa}, {0x1, 0x2, 0x3, 0x9}, {0x0, 0x4, 0x0, 0x8}], 0x10, 0x80000000}, 0x94) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="7bedcb5d07081196f37538e486dd"], 0x66) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 600.406013ms ago: executing program 7 (id=13205): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000580)='xs_stream_read_request\x00', r0, 0x0, 0xfffffffffffffffa}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0x924}, 0x18) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) socketpair(0x2b, 0x4, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r5}, 0x10) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r4, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYRES16=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYRESOCT=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYRESDEC=r8], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r9, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x400100, 0x0) ioctl$TUNSETOFFLOAD(r11, 0x400454d0, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r10], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000280)={'wg2\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r13}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYRESDEC=r2], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000008c0), 0x4}, 0x0, 0x6, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 530.419348ms ago: executing program 8 (id=13206): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0xf, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa36, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0xa7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x401}}, @exit]}, &(0x7f00000001c0)='GPL\x00', 0x6, 0x33, &(0x7f0000000240)=""/51, 0x40f00, 0x51, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xa, 0x2990, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[0xffffffffffffffff], &(0x7f0000000600)=[{0x5, 0x3, 0xe, 0x4}], 0x10, 0x10001}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000a80)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10000, 0x8, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{r2}, &(0x7f0000000b00), &(0x7f0000000ac0)=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000080)={r2, &(0x7f0000000080), 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000800)={@fallback=0xffffffffffffffff, 0x11, 0x1, 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000900)=@generic={&(0x7f00000008c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000b40)=ANY=[@ANYRES32=r5, @ANYRES32=r0, @ANYBLOB="1800000001000000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="4fe25813ba5c8e255e37fe2425da685b17fb7a2006cbd40441d5f7a2f8193cddde434949f3086a8374e94ad45c8676a518485f2559bcafb8fedb7866cc2db5afa3f2bf54e41ff3f4b56226364c13635e7ddf4be5fdc6", @ANYRES64=r4], 0x20) write$cgroup_int(r3, &(0x7f0000000a40)=0x3, 0x12) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x3, 0x5, 0x1000, 0xffffffffffffffff, 0x6}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@var, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func, @volatile={0x10}, @ptr={0x2, 0x0, 0x0, 0x2, 0x1}, @const={0x2000000, 0x0, 0x0, 0xa, 0x2}]}}, 0x0, 0x96}, 0x28) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.self_freezing\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 417.987367ms ago: executing program 8 (id=13207): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xffffffff}, [@call={0x85, 0x0, 0x0, 0x7d}, @printk={@ld}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r3, &(0x7f00000002c0)="f201fb7e16a119b770bc2da054d02cf103031e4c4aa6c4da8a4363c6f2060be89aac515fe40678dbc67b8a4b6118aed6844e8224e1c310eddc24621e2c72865d6619358c2b3acacce3ea52a5a89df521a5d2e86bd46e39273d8516aa99ed1479c82baa9f3aa92e4aa0723b5defad2df6269f80f239fb31c6a914bcb5b85a3e3f5417b697e953d14a189dff1ea2c53ad037ce2165caafab544ebe73c60ea2eff07cdd079cd5bb12e4c640837f0d9b4daaec1260b998ed", &(0x7f00000004c0)=""/4096, 0x4}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) close(r0) 335.574724ms ago: executing program 0 (id=13208): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='mm_page_alloc\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xb, 0xff, 0x2, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000001540)=""/161}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r4, &(0x7f0000000300), &(0x7f0000000340)=""/55}, 0x20) sendmsg$inet(r1, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r2, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r5}, 0x10) 207.698514ms ago: executing program 8 (id=13209): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xfc, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xb3, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x287, '\x00', r2, 0xffffffffffffffff, 0x5, 0x5}, 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 191.960045ms ago: executing program 39 (id=13209): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xfc, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xb3, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x287, '\x00', r2, 0xffffffffffffffff, 0x5, 0x5}, 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 187.621335ms ago: executing program 6 (id=13210): syz_clone(0x8000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 187.196136ms ago: executing program 0 (id=13211): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/12, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="00000000000000372c134a1ae3cc79b858b300b7080000140000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x4040) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) syz_clone(0x500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0xb4f7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r5, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) recvmsg(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000010000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000fdffffff000000000000110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x2d) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe1b) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80280, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) 186.818915ms ago: executing program 40 (id=13211): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/12, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="00000000000000372c134a1ae3cc79b858b300b7080000140000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x4040) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) syz_clone(0x500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0xb4f7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r5, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) recvmsg(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000010000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000fdffffff000000000000110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x2d) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe1b) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80280, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) 172.481056ms ago: executing program 9 (id=13212): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000700"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000240)=0x6fa6, 0x12) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 100.992292ms ago: executing program 6 (id=13213): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="000000f8ffffff000009000000000000000000004f95ac697c6db11b05f5ef6b7f57465ca63135fa746ee240d2d0a31d0d2a1aa05773e93011853e1e95b3653646f056b9f6626b478855478d552e25209e79db327a4eed9f83e451ee3a70c3febcaf1c82ee9775afc7e2c4a75476980825ad1c1fc173b8adcc397c79bad542180000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006100"/32], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x90102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x80000001}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x541b, 0x2000fcc6) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a399dd9212c1a81dc4d17ee071e839b3e6cf2d6a0c4db0347f2563b7013996d3773fb37bf2c8f6b6e20200198399821b65d1e50b34e67ff3"], 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r3, 0x58, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000004c0)="0031835e4b17b7910b5aaaf0eb6ec9631517b3c155952c3636bbf2d50554487ea6130d645d5973df612554", 0x2b}, {&(0x7f0000000700)="2a3148356cfa8d6a0e36d4eac5896f2b0ac5c74fa0c0a8478941c6a436d4502c3722a1e9394752cb16e566db3d8dccf610b398a83e145ea3305f856053302a4775e662e9cbfd36ade8c9efc9fa631626b7315ff4ca114573393046ab2f905a2308b2084e87852121a4df9d720aa36b337a036a01debdb84f5d9e7ad62572583c0a86ee023efe00643b97bae30e006c604d5379ca267c0308c2d6b36a5fc9da0b4adc1d00d8416484dbc9bc21536ef51a8e7ff1753d5dd44a7f4eef23afeb2c", 0xbf}, {&(0x7f00000007c0)="e170d1f20e710f006015c6d8a98216131ca64ac88424904c2ccf3305cb471a2adbd8fe8ba6a6bba8dae5fa92225a89fa1ec9e80318ecad7437a78496c02d78dc66116e50b593651e35edd2f32f89b0c5b65c663775ae6cf1216db2c2344ca5bb96ea86f0b2779ed3578c4f305e41090ae88cf82e0195e1485b4d1e862295e63abcd4e1fde712be1bac5eb5ab996335e19bc52ef43febe8617d31961758cab2890aeb088ad9cc76937ce3646d7fa7900234c23be7ae4cdb07ad", 0xb9}], 0x3, &(0x7f0000000940)=[@ip_ttl={{0x14, 0x0, 0x2, 0xa598}}, @ip_retopts={{0x9c, 0x0, 0x7, {[@rr={0x7, 0xf, 0xf7, [@remote, @dev={0xac, 0x14, 0x14, 0x43}, @multicast2]}, @rr={0x7, 0x1b, 0xe7, [@empty, @multicast2, @loopback, @dev={0xac, 0x14, 0x14, 0x34}, @multicast1, @rand_addr=0x64010101]}, @generic={0x7, 0x11, "fe93a4619fad740fc228c65f1d31a7"}, @cipso={0x86, 0x3c, 0x2, [{0x7, 0xb, "ebf235e6ed2f3b78ba"}, {0x2, 0x5, "7b9a7e"}, {0x6, 0xe, "f085122e47ab13b1a696e344"}, {0x2, 0x7, "022288d652"}, {0x2, 0xd, "076a09a92e027d3a9f28a4"}, {0x6, 0x4, "23da"}]}, @lsrr={0x83, 0x13, 0x1d, [@multicast2, @private=0xa010101, @empty, @private=0xa010101]}]}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x40}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @loopback, @dev={0xac, 0x14, 0x14, 0x27}}}}], 0x108}, 0x8000000) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000040"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfe3a) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0xc}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) 100.476102ms ago: executing program 41 (id=13213): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="000000f8ffffff000009000000000000000000004f95ac697c6db11b05f5ef6b7f57465ca63135fa746ee240d2d0a31d0d2a1aa05773e93011853e1e95b3653646f056b9f6626b478855478d552e25209e79db327a4eed9f83e451ee3a70c3febcaf1c82ee9775afc7e2c4a75476980825ad1c1fc173b8adcc397c79bad542180000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006100"/32], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x90102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x80000001}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x541b, 0x2000fcc6) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a399dd9212c1a81dc4d17ee071e839b3e6cf2d6a0c4db0347f2563b7013996d3773fb37bf2c8f6b6e20200198399821b65d1e50b34e67ff3"], 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r3, 0x58, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000004c0)="0031835e4b17b7910b5aaaf0eb6ec9631517b3c155952c3636bbf2d50554487ea6130d645d5973df612554", 0x2b}, {&(0x7f0000000700)="2a3148356cfa8d6a0e36d4eac5896f2b0ac5c74fa0c0a8478941c6a436d4502c3722a1e9394752cb16e566db3d8dccf610b398a83e145ea3305f856053302a4775e662e9cbfd36ade8c9efc9fa631626b7315ff4ca114573393046ab2f905a2308b2084e87852121a4df9d720aa36b337a036a01debdb84f5d9e7ad62572583c0a86ee023efe00643b97bae30e006c604d5379ca267c0308c2d6b36a5fc9da0b4adc1d00d8416484dbc9bc21536ef51a8e7ff1753d5dd44a7f4eef23afeb2c", 0xbf}, {&(0x7f00000007c0)="e170d1f20e710f006015c6d8a98216131ca64ac88424904c2ccf3305cb471a2adbd8fe8ba6a6bba8dae5fa92225a89fa1ec9e80318ecad7437a78496c02d78dc66116e50b593651e35edd2f32f89b0c5b65c663775ae6cf1216db2c2344ca5bb96ea86f0b2779ed3578c4f305e41090ae88cf82e0195e1485b4d1e862295e63abcd4e1fde712be1bac5eb5ab996335e19bc52ef43febe8617d31961758cab2890aeb088ad9cc76937ce3646d7fa7900234c23be7ae4cdb07ad", 0xb9}], 0x3, &(0x7f0000000940)=[@ip_ttl={{0x14, 0x0, 0x2, 0xa598}}, @ip_retopts={{0x9c, 0x0, 0x7, {[@rr={0x7, 0xf, 0xf7, [@remote, @dev={0xac, 0x14, 0x14, 0x43}, @multicast2]}, @rr={0x7, 0x1b, 0xe7, [@empty, @multicast2, @loopback, @dev={0xac, 0x14, 0x14, 0x34}, @multicast1, @rand_addr=0x64010101]}, @generic={0x7, 0x11, "fe93a4619fad740fc228c65f1d31a7"}, @cipso={0x86, 0x3c, 0x2, [{0x7, 0xb, "ebf235e6ed2f3b78ba"}, {0x2, 0x5, "7b9a7e"}, {0x6, 0xe, "f085122e47ab13b1a696e344"}, {0x2, 0x7, "022288d652"}, {0x2, 0xd, "076a09a92e027d3a9f28a4"}, {0x6, 0x4, "23da"}]}, @lsrr={0x83, 0x13, 0x1d, [@multicast2, @private=0xa010101, @empty, @private=0xa010101]}]}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x40}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @loopback, @dev={0xac, 0x14, 0x14, 0x27}}}}], 0x108}, 0x8000000) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000040"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfe3a) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0xc}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) 0s ago: executing program 9 (id=13215): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={@cgroup, 0xffffffffffffffff, 0x12, 0x0, 0x0, @void, @value=0x0}, 0x20) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={@cgroup, 0xffffffffffffffff, 0x12, 0x0, 0x0, @void, @value=0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000540)=ANY=[@ANYRES64=r0, @ANYRESHEX=r2, @ANYBLOB="0000000000000000b708ff00000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300005900000095fec883df9eefde208243aa9a5c9d3c9ae683ca59a8a86afed32ac3f1da1760d43c1a2141"], 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) (async) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b704000002000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r5, 0xfffff000, 0xe, 0x0, &(0x7f0000000300)="61df712bc884fed5722780b605a7", 0x0, 0x7fff, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r5, 0xfffff000, 0xe, 0x0, &(0x7f0000000300)="61df712bc884fed5722780b605a7", 0x0, 0x7fff, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="030000000000050000000000000000000000000000000000080000004d3495e55f16ff75556ca3d27338740a94d9acacf2d01b847a0463dd51db87d007ce7681f037d55b30c973f0078e4c4e55fb9a1a834c3d739d6b6604d5564af7bb98"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r10}, &(0x7f00000000c0), &(0x7f0000000100)=r9}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r10}, &(0x7f00000000c0), &(0x7f0000000100)=r9}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r8}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) close(0xffffffffffffffff) kernel console output (not intermixed with test programs): 6] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 547.395547][T21446] syz.8.5762[21446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 547.424229][T21446] device veth0_vlan left promiscuous mode [ 547.442089][T21446] device veth0_vlan entered promiscuous mode [ 550.492599][T21547] device veth1_macvtap left promiscuous mode [ 550.589188][T21547] device macsec0 entered promiscuous mode [ 552.257451][T21624] syz.9.5809[21624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.257508][T21624] syz.9.5809[21624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.310756][T21626] syz.6.5810[21626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.407061][T21626] syz.6.5810[21626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.923951][T21674] device syzkaller0 entered promiscuous mode [ 554.228584][T21728] : port 1(veth0_to_team) entered blocking state [ 554.235204][T21728] : port 1(veth0_to_team) entered disabled state [ 554.318009][T21728] device veth0_to_team entered promiscuous mode [ 555.052139][T21770] syz.7.5846[21770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.052211][T21770] syz.7.5846[21770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.193895][T21770] syz.7.5846[21770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.349178][T21770] syz.7.5846[21770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 557.117276][T21826] device pim6reg1 entered promiscuous mode [ 558.141126][T21864] device pim6reg1 entered promiscuous mode [ 558.166296][T21853] syz.6.5868[21853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.191209][T21853] syz.6.5868[21853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.338276][T21864] syz.8.5871[21864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.394368][T21864] syz.8.5871[21864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.429109][T21868] syz.8.5871[21868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.479282][T21868] syz.8.5871[21868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.945063][T21884] device syzkaller0 entered promiscuous mode [ 559.376312][T21890] device sit0 left promiscuous mode [ 560.116077][T21912] device sit0 entered promiscuous mode [ 560.225125][T21919] device pim6reg1 entered promiscuous mode [ 560.306506][T21922] device pim6reg1 entered promiscuous mode [ 561.318675][T21969] device sit0 entered promiscuous mode [ 561.392189][T21968] device pim6reg1 entered promiscuous mode [ 561.719424][T22015] device pim6reg1 entered promiscuous mode [ 562.550347][T22068] device syzkaller0 entered promiscuous mode [ 562.589110][T22072] device pim6reg1 entered promiscuous mode [ 562.990054][T22097] device wg2 left promiscuous mode [ 563.022944][T22097] device wg2 entered promiscuous mode [ 565.180106][T22176] device sit0 left promiscuous mode [ 565.960001][T22202] syz.8.5965[22202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 565.960052][T22202] syz.8.5965[22202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 566.540373][T22253] device syzkaller0 entered promiscuous mode [ 567.236180][T22324] device pim6reg1 entered promiscuous mode [ 567.788321][T22330] device veth0_vlan left promiscuous mode [ 567.815065][T22330] device veth0_vlan entered promiscuous mode [ 568.335747][T22369] device syzkaller0 entered promiscuous mode [ 568.456709][T22371] device sit0 left promiscuous mode [ 569.153671][T22402] device pim6reg1 entered promiscuous mode [ 569.543008][T22407] device wg2 entered promiscuous mode [ 570.277647][T22466] bridge0: port 2(bridge_slave_1) entered disabled state [ 570.284902][T22466] bridge0: port 1(bridge_slave_0) entered disabled state [ 573.375848][T22613] device sit0 entered promiscuous mode [ 575.686867][T22702] device pim6reg1 entered promiscuous mode [ 576.795604][T22724] device syzkaller0 entered promiscuous mode [ 582.816377][T22968] device syzkaller0 entered promiscuous mode [ 583.661845][T22986] device pim6reg1 entered promiscuous mode [ 587.117313][T23113] device syzkaller0 entered promiscuous mode [ 587.767394][T23153] syz.6.6237[23153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.767458][T23153] syz.6.6237[23153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.783676][T23154] syz.6.6237[23154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.795812][T23154] syz.6.6237[23154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.843828][T23156] device wg2 entered promiscuous mode [ 588.429905][T23182] device sit0 left promiscuous mode [ 588.487455][T23187] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 588.500372][T23187] device syzkaller0 entered promiscuous mode [ 588.632012][T23210] device pim6reg1 entered promiscuous mode [ 588.706696][T23227] device sit0 entered promiscuous mode [ 588.829371][T23240] device wg2 left promiscuous mode [ 588.858281][T23241] device wg2 entered promiscuous mode [ 589.034018][T23253] Q6`Ҙ: renamed from lo [ 590.025979][T23278] syz.3.6271[23278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 590.039194][T23278] syz.3.6271[23278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 590.058677][T23281] device sit0 entered promiscuous mode [ 590.490749][T23298] device syzkaller0 entered promiscuous mode [ 590.502045][T23302] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.537973][T23304] device pim6reg1 entered promiscuous mode [ 591.570599][T23371] device sit0 left promiscuous mode [ 592.180817][T23390] device macsec0 entered promiscuous mode [ 592.233731][T23408] device pim6reg1 entered promiscuous mode [ 592.239383][T23412] syz.9.6313[23412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 592.239611][T23412] syz.9.6313[23412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.230521][T23464] device syzkaller0 entered promiscuous mode [ 593.831725][T23519] : renamed from vlan1 [ 595.024888][T23593] device wg2 entered promiscuous mode [ 595.064421][T23593] device syzkaller0 entered promiscuous mode [ 595.698535][T23625] device syzkaller0 entered promiscuous mode [ 595.775995][T23624] device wg2 left promiscuous mode [ 596.147221][T23649] syz.7.6380[23649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 596.147299][T23649] syz.7.6380[23649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 596.462773][T23645] device sit0 entered promiscuous mode [ 597.524432][T23699] device syzkaller0 entered promiscuous mode [ 597.705421][T23693] device veth0_vlan left promiscuous mode [ 597.727246][T23693] device veth0_vlan entered promiscuous mode [ 597.738413][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 597.746738][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 597.754354][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 598.377253][T23749] device wg2 entered promiscuous mode [ 598.457755][T23752] device wg2 left promiscuous mode [ 598.706168][T23777] syz.6.6412[23777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.706224][T23775] syz.6.6412[23775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.706229][T23777] syz.6.6412[23777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 599.387848][T23811] device sit0 left promiscuous mode [ 599.478465][T23819] device wg2 left promiscuous mode [ 599.628277][T23825] device wg2 entered promiscuous mode [ 600.757938][T23859] bridge0: port 2(bridge_slave_1) entered disabled state [ 600.775933][T23859] bridge0: port 1(bridge_slave_0) entered disabled state [ 601.256921][T23876] device bridge_slave_1 left promiscuous mode [ 601.263276][T23876] bridge0: port 2(bridge_slave_1) entered disabled state [ 601.467357][T23876] device bridge_slave_0 left promiscuous mode [ 601.473682][T23876] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.058094][T23899] device veth0_vlan left promiscuous mode [ 602.064376][T23899] device veth0_vlan entered promiscuous mode [ 602.108252][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 602.147242][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 602.155000][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 602.771138][T23931] device syzkaller0 entered promiscuous mode [ 603.695085][T23965] : renamed from vlan0 [ 605.638920][T24035] device wg2 left promiscuous mode [ 605.821341][T24039] device wg2 entered promiscuous mode [ 605.903538][T24041] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.919376][T24041] bridge0: port 1(bridge_slave_0) entered disabled state [ 607.570224][T24146] device veth1_macvtap left promiscuous mode [ 607.576812][T24146] device macsec0 left promiscuous mode [ 608.471512][T24167] device wg2 left promiscuous mode [ 611.133585][T24241] device pim6reg1 entered promiscuous mode [ 611.361940][T24254] device pim6reg1 entered promiscuous mode [ 611.401349][T24246] device veth0_vlan left promiscuous mode [ 611.504029][T24246] device veth0_vlan entered promiscuous mode [ 612.656060][T24352] device wg2 left promiscuous mode [ 612.759114][T24352] device wg2 entered promiscuous mode [ 614.649100][T24468] device macsec0 entered promiscuous mode [ 615.059332][T24479] device pim6reg1 entered promiscuous mode [ 615.168107][T24480] device wg2 left promiscuous mode [ 616.146489][T24513] device pim6reg1 entered promiscuous mode [ 616.474742][T24532] device pim6reg1 entered promiscuous mode [ 618.382800][T24593] syz.6.6630[24593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 618.382859][T24593] syz.6.6630[24593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 618.517519][T24593] syz.6.6630[24593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 618.716803][T24593] syz.6.6630[24593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.037988][T24604] device syzkaller0 entered promiscuous mode [ 619.982298][T24653] device sit0 entered promiscuous mode [ 620.022770][T24657] device veth0_vlan left promiscuous mode [ 620.050251][T24657] device veth0_vlan entered promiscuous mode [ 620.541686][T24659] device syzkaller0 entered promiscuous mode [ 621.043635][T24678] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 621.068090][T24678] pim6reg0: linktype set to 530 [ 621.970052][T24715] device sit0 entered promiscuous mode [ 622.721118][T24739] device sit0 left promiscuous mode [ 622.807874][T24745] device pim6reg1 entered promiscuous mode [ 622.870599][T24739] device sit0 entered promiscuous mode [ 623.989925][T24784] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 624.058707][T24784] device syzkaller0 entered promiscuous mode [ 624.195044][T24803] GPL: port 1(erspan0) entered blocking state [ 624.257117][T24803] GPL: port 1(erspan0) entered disabled state [ 624.263985][T24803] device erspan0 entered promiscuous mode [ 624.361538][T24809] GPL: port 1(erspan0) entered blocking state [ 624.367672][T24809] GPL: port 1(erspan0) entered forwarding state [ 625.676221][T24856] device pim6reg1 entered promiscuous mode [ 625.865178][T24887] syz.9.6716[24887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 625.865214][T24887] syz.9.6716[24887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 626.675694][T24913] device veth0_vlan left promiscuous mode [ 626.968780][T24913] device veth0_vlan entered promiscuous mode [ 628.278518][T24968] device veth1_macvtap left promiscuous mode [ 629.306853][T24983] device pim6reg1 entered promiscuous mode [ 630.574491][T25041] syz.8.6758[25041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.574579][T25041] syz.8.6758[25041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.643693][T25025] device syzkaller0 entered promiscuous mode [ 632.542089][T25127] device syzkaller0 entered promiscuous mode [ 632.888272][T25137] device veth0_vlan left promiscuous mode [ 632.896053][T25137] device veth0_vlan entered promiscuous mode [ 632.906052][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 632.915245][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 632.923373][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 633.060903][T25139] device syzkaller0 entered promiscuous mode [ 633.448702][T25154] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 633.643863][ T24] audit: type=1400 audit(1756318558.329:174): avc: denied { create } for pid=25158 comm="syz.6.6792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 634.271982][T25195] device syzkaller0 entered promiscuous mode [ 635.002977][T25225] device syzkaller0 entered promiscuous mode [ 636.209074][T25269] device wg2 entered promiscuous mode [ 637.392042][T25378] bridge0: port 2(bridge_slave_1) entered disabled state [ 637.399703][T25378] bridge0: port 1(bridge_slave_0) entered disabled state [ 637.480020][T25375] device veth0_vlan left promiscuous mode [ 637.501683][T25375] device veth0_vlan entered promiscuous mode [ 637.644856][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.653367][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 637.667117][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 641.121566][T25492] device syzkaller0 entered promiscuous mode [ 642.030366][T25547] device pim6reg1 entered promiscuous mode [ 645.282799][T25660] device pim6reg1 entered promiscuous mode [ 645.657262][T25665] device sit0 entered promiscuous mode [ 658.560983][T25724] device pim6reg1 entered promiscuous mode [ 658.790906][T25722] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.798641][T25722] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.806062][T25722] device bridge_slave_0 entered promiscuous mode [ 658.813170][T25722] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.820254][T25722] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.827731][T25722] device bridge_slave_1 entered promiscuous mode [ 659.084371][T25722] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.091490][T25722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 659.098784][T25722] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.106040][T25722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 659.293746][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 659.314626][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 659.338405][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 659.376620][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 659.392868][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 659.403384][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.410572][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 659.419150][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 659.427963][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 659.436333][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.443401][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 659.455786][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 659.464406][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 659.490405][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 659.499750][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 659.515185][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 659.525006][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 659.540225][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 659.548290][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 659.556962][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 659.564643][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 659.579528][T25722] device veth0_vlan entered promiscuous mode [ 659.597864][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 659.606031][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 659.639311][T25722] device veth1_macvtap entered promiscuous mode [ 659.660024][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 659.667943][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 659.687320][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 659.723246][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 659.744571][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 661.559393][ T7] device veth0_vlan left promiscuous mode [ 661.671611][T25930] bridge0: port 2(bridge_slave_1) entered disabled state [ 661.679411][T25930] bridge0: port 1(bridge_slave_0) entered disabled state [ 661.704650][T25939] device bridge_slave_1 left promiscuous mode [ 661.711808][T25939] bridge0: port 2(bridge_slave_1) entered disabled state [ 661.719550][T25939] device bridge_slave_0 left promiscuous mode [ 661.725730][T25939] bridge0: port 1(bridge_slave_0) entered disabled state [ 663.196392][T26006] device veth0_vlan left promiscuous mode [ 663.235594][T26006] device veth0_vlan entered promiscuous mode [ 664.917386][T26099] device wg2 entered promiscuous mode [ 665.048936][T26113] device veth0_vlan left promiscuous mode [ 665.058489][T26113] device veth0_vlan entered promiscuous mode [ 665.079901][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 665.108691][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 665.159357][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 665.346383][T26122] device syzkaller0 entered promiscuous mode [ 665.760319][T26163] device sit0 left promiscuous mode [ 666.074636][T26169] device sit0 entered promiscuous mode [ 667.274863][T26201] : renamed from bond_slave_0 [ 669.386093][T26262] device veth0_vlan left promiscuous mode [ 669.399264][T26262] device veth0_vlan entered promiscuous mode [ 672.380705][T26363] device syzkaller0 entered promiscuous mode [ 672.610888][ T94] udevd[94]: worker [25700] terminated by signal 33 (Unknown signal 33) [ 672.641041][ T94] udevd[94]: worker [25700] failed while handling '/devices/virtual/block/loop0' [ 672.956143][T26389] device sit0 left promiscuous mode [ 672.991073][T26389] device sit0 entered promiscuous mode [ 674.195868][T26414] device syzkaller0 entered promiscuous mode [ 675.252458][T26454] GPL: port 1(erspan0) entered blocking state [ 675.258842][T26454] GPL: port 1(erspan0) entered disabled state [ 675.265431][T26454] device erspan0 entered promiscuous mode [ 675.276421][T26445] GPL: port 1(erspan0) entered blocking state [ 675.283976][T26445] GPL: port 1(erspan0) entered forwarding state [ 675.894153][T26533] tap0: tun_chr_ioctl cmd 1074025677 [ 675.903925][T26533] tap0: linktype set to 768 [ 678.622744][T26642] device veth0_vlan left promiscuous mode [ 678.766733][T26642] device veth0_vlan entered promiscuous mode [ 680.398167][T26718] device syzkaller0 entered promiscuous mode [ 680.406912][T26733] syz.7.7224[26733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 680.406965][T26733] syz.7.7224[26733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 680.880005][T26741] device syzkaller0 entered promiscuous mode [ 680.929373][T26753] syz.9.7229[26753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 680.929461][T26753] syz.9.7229[26753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.351718][T26754] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 681.377050][T26754] device pim6reg1 entered promiscuous mode [ 682.039249][T26808] device veth0_vlan left promiscuous mode [ 682.069836][T26808] device veth0_vlan entered promiscuous mode [ 682.151906][T26817] device syzkaller0 entered promiscuous mode [ 682.540201][T26824] device bridge_slave_1 left promiscuous mode [ 682.562858][T26824] bridge0: port 2(bridge_slave_1) entered disabled state [ 682.623573][T26824] device bridge_slave_0 left promiscuous mode [ 682.635921][T26824] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.314096][T26846] device syzkaller0 entered promiscuous mode [ 683.908207][T26902] device syzkaller0 entered promiscuous mode [ 684.940949][T26945] device syzkaller0 entered promiscuous mode [ 685.590685][T26952] device syzkaller0 entered promiscuous mode [ 685.925326][T26973] device syzkaller0 entered promiscuous mode [ 685.948286][T26979] syz.0.7290[26979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 685.948389][T26979] syz.0.7290[26979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 686.369648][T26986] device sit0 entered promiscuous mode [ 687.706090][T27037] device syzkaller0 entered promiscuous mode [ 688.024862][T27049] device pim6reg1 entered promiscuous mode [ 688.345171][T27063] device wg2 left promiscuous mode [ 688.845265][T27062] device syzkaller0 entered promiscuous mode [ 689.104496][T27077] device sit0 left promiscuous mode [ 689.193686][T27077] device sit0 entered promiscuous mode [ 691.138920][T27193] : renamed from vlan0 [ 693.365910][T27289] device syzkaller0 entered promiscuous mode [ 694.144482][T27337] syz.9.7389[27337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.144534][T27337] syz.9.7389[27337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.213968][T27341] device veth0_vlan left promiscuous mode [ 694.331257][T27341] device veth0_vlan entered promiscuous mode [ 695.221074][T27410] aaaaaaaaa: renamed from vlan1 [ 695.546959][T27436] device pim6reg1 entered promiscuous mode [ 697.060281][T27495] device syzkaller0 entered promiscuous mode [ 697.601156][T27525] device pim6reg1 entered promiscuous mode [ 698.543355][T27568] device wg2 left promiscuous mode [ 698.564955][T27568] device wg2 entered promiscuous mode [ 698.696693][T27582] device veth1_macvtap left promiscuous mode [ 698.769059][T27582] device macsec0 entered promiscuous mode [ 698.824764][T27588] device veth1_macvtap entered promiscuous mode [ 699.488621][T27607] device wg2 left promiscuous mode [ 699.514612][T27607] device wg2 entered promiscuous mode [ 699.794361][T27616] device syzkaller0 entered promiscuous mode [ 700.133227][T27636] geneve1: tun_chr_ioctl cmd 35108 [ 700.283276][T27642] device wg2 entered promiscuous mode [ 700.452671][T27649] : port 1(veth0_to_team) entered blocking state [ 700.481726][T27649] : port 1(veth0_to_team) entered disabled state [ 700.531125][T27649] device veth0_to_team entered promiscuous mode [ 701.269164][T27668] device wg2 left promiscuous mode [ 701.615035][T27672] device veth0_vlan left promiscuous mode [ 701.621343][T27672] device veth0_vlan entered promiscuous mode [ 701.697856][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 701.777345][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 701.924329][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 703.663770][T27739] device wg2 left promiscuous mode [ 703.950263][T27738] device wg2 entered promiscuous mode [ 705.723957][T27795] device wg2 entered promiscuous mode [ 707.633590][T27890] device sit0 left promiscuous mode [ 707.643983][T27891] device sit0 entered promiscuous mode [ 707.859156][T27912] device veth0_vlan left promiscuous mode [ 707.865496][T27912] device veth0_vlan entered promiscuous mode [ 707.873385][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 707.882214][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 707.892219][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 711.346267][T28008] device syzkaller0 entered promiscuous mode [ 712.578860][T28114] device wg2 entered promiscuous mode [ 712.688604][T28110] device pim6reg1 entered promiscuous mode [ 713.765055][T28136] device syzkaller0 entered promiscuous mode [ 715.461719][T28230] device syzkaller0 entered promiscuous mode [ 715.630769][T28266] device pim6reg1 entered promiscuous mode [ 717.991808][T28357] device wg2 left promiscuous mode [ 719.345486][T28418] device syzkaller0 entered promiscuous mode [ 720.174800][T28443] device wg2 left promiscuous mode [ 720.339425][T28443] device wg2 entered promiscuous mode [ 721.934480][T28462] syz.7.7705[28462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 721.934579][T28462] syz.7.7705[28462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 724.532120][T28530] bridge0: port 3(veth1) entered blocking state [ 724.563066][T28530] bridge0: port 3(veth1) entered disabled state [ 724.635645][T28530] device veth1 entered promiscuous mode [ 725.925707][T28617] device syzkaller0 entered promiscuous mode [ 726.549224][T28672] bridge0: port 3(veth0) entered blocking state [ 726.559944][T28672] bridge0: port 3(veth0) entered disabled state [ 726.567312][T28672] device veth0 entered promiscuous mode [ 726.579241][T28663] device veth0 left promiscuous mode [ 726.585354][T28663] bridge0: port 3(veth0) entered disabled state [ 727.266019][T28696] device wg2 left promiscuous mode [ 729.533620][T28795] device veth1_to_team entered promiscuous mode [ 729.870009][T28801] device sit0 left promiscuous mode [ 731.654081][T28855] device syzkaller0 entered promiscuous mode [ 731.740253][T28867] device sit0 left promiscuous mode [ 731.981864][T28871] device sit0 entered promiscuous mode [ 732.004864][T28877] syz.6.7817[28877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 732.004921][T28877] syz.6.7817[28877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 732.396808][T28888] device wg2 entered promiscuous mode [ 732.856776][T28914] device sit0 left promiscuous mode [ 732.909699][T28914] device sit0 entered promiscuous mode [ 732.938451][T28918] device wg2 left promiscuous mode [ 733.271430][T28935] device wg2 entered promiscuous mode [ 734.651210][T28981] device pim6reg1 entered promiscuous mode [ 734.694737][T28983] device sit0 left promiscuous mode [ 735.107264][T29007] device sit0 entered promiscuous mode [ 735.179916][T29013] device syzkaller0 entered promiscuous mode [ 736.775079][T29082] device wg2 left promiscuous mode [ 736.921581][T29082] device wg2 entered promiscuous mode [ 736.994728][T29096] device syzkaller0 entered promiscuous mode [ 737.391025][T29109] syz.9.7885[29109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 737.391085][T29109] syz.9.7885[29109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 738.131555][T29135] device sit0 left promiscuous mode [ 739.624133][T29209] device sit0 left promiscuous mode [ 740.329282][T29238] device pim6reg1 entered promiscuous mode [ 740.758626][T29272] syz.0.7925[29272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 740.758714][T29272] syz.0.7925[29272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 741.725146][T29306] device pim6reg1 entered promiscuous mode [ 743.984857][T29437] device syzkaller0 entered promiscuous mode [ 744.296647][T29455] syz.7.7970[29455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 744.296736][T29455] syz.7.7970[29455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 744.597722][T29479] device veth1_macvtap left promiscuous mode [ 744.628456][T29479] device macsec0 left promiscuous mode [ 746.254329][T29488] device sit0 entered promiscuous mode [ 746.827033][T29514] device pim6reg1 entered promiscuous mode [ 748.481001][T29558] device syzkaller0 entered promiscuous mode [ 750.034359][T29691] device wg2 entered promiscuous mode [ 750.248005][T29693] device pim6reg1 left promiscuous mode [ 751.107647][T29741] device syzkaller0 entered promiscuous mode [ 751.342094][T29750] device pim6reg1 entered promiscuous mode [ 751.634965][T29764] device pim6reg1 entered promiscuous mode [ 751.804102][T29772] syz.0.8061[29772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 751.804158][T29772] syz.0.8061[29772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 752.628685][T29791] : renamed from pim6reg1 [ 753.987772][T29813] device pim6reg1 entered promiscuous mode [ 754.195790][T29834] device veth0_vlan left promiscuous mode [ 754.206210][T29834] device veth0_vlan entered promiscuous mode [ 754.511131][T29871] device veth0_vlan left promiscuous mode [ 754.557639][T29871] device veth0_vlan entered promiscuous mode [ 754.585792][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 754.604041][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 754.622013][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 754.935236][T29905] device sit0 left promiscuous mode [ 756.023601][T29956] device syzkaller0 entered promiscuous mode [ 756.466181][T29998] device pim6reg1 entered promiscuous mode [ 756.799073][T30012] device veth0_vlan left promiscuous mode [ 756.804858][T30012] device veth0_vlan entered promiscuous mode [ 756.926759][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 756.976860][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 757.013729][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 757.581585][T30050] device syzkaller0 entered promiscuous mode [ 757.592761][T30054] device wg2 left promiscuous mode [ 757.608429][T30054] device wg2 entered promiscuous mode [ 758.620747][T30081] device wg2 left promiscuous mode [ 758.789411][T30082] device wg2 entered promiscuous mode [ 759.777935][T30122] device syzkaller0 entered promiscuous mode [ 760.268383][T30149] device wg2 left promiscuous mode [ 760.322761][T30146] device wg2 entered promiscuous mode [ 760.622773][T30181] device syzkaller0 entered promiscuous mode [ 764.075734][T30381] device sit0 left promiscuous mode [ 764.792145][T30418] device veth0_vlan left promiscuous mode [ 764.838133][T30418] device veth0_vlan entered promiscuous mode [ 764.845368][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 764.865506][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 764.875406][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 765.289279][T30448] device veth0_vlan left promiscuous mode [ 765.299268][T30448] device veth0_vlan entered promiscuous mode [ 765.309046][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 765.317481][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 765.325388][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 765.647157][T30472] device pim6reg1 entered promiscuous mode [ 765.700691][T30471] device sit0 entered promiscuous mode [ 768.137723][T30608] device macsec0 entered promiscuous mode [ 780.719672][T30680] device veth0_vlan left promiscuous mode [ 780.741141][T30680] device veth0_vlan entered promiscuous mode [ 780.870854][T30695] device syzkaller0 entered promiscuous mode [ 781.146856][T30697] device pim6reg1 entered promiscuous mode [ 781.300415][T30697] device syzkaller0 entered promiscuous mode [ 781.497096][T30755] device sit0 entered promiscuous mode [ 781.853545][T30794] device sit0 left promiscuous mode [ 781.875084][T30794] device sit0 entered promiscuous mode [ 782.728047][T30825] device sit0 left promiscuous mode [ 782.833328][T30819] device sit0 entered promiscuous mode [ 783.001872][T30844] device bridge_slave_1 left promiscuous mode [ 783.015342][T30844] bridge0: port 2(bridge_slave_1) entered disabled state [ 783.038485][T30844] device bridge_slave_0 left promiscuous mode [ 783.048986][T30844] bridge0: port 1(bridge_slave_0) entered disabled state [ 783.233779][T30857] device pim6reg1 entered promiscuous mode [ 783.447870][T30880] device wg2 left promiscuous mode [ 783.565750][T30896] syz.9.8384[30896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 783.565814][T30896] syz.9.8384[30896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 783.621134][T30897] bridge0: port 1(bridge_slave_0) entered blocking state [ 783.653550][T30897] bridge0: port 1(bridge_slave_0) entered disabled state [ 783.661615][T30897] device bridge_slave_0 entered promiscuous mode [ 783.668879][T30897] bridge0: port 2(bridge_slave_1) entered blocking state [ 783.676730][T30897] bridge0: port 2(bridge_slave_1) entered disabled state [ 783.684256][T30897] device bridge_slave_1 entered promiscuous mode [ 783.763406][T30897] bridge0: port 2(bridge_slave_1) entered blocking state [ 783.770611][T30897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 783.778022][T30897] bridge0: port 1(bridge_slave_0) entered blocking state [ 783.785138][T30897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 783.811615][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 783.821885][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 783.833825][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 783.850409][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 783.858943][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 783.866140][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 783.902576][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 783.910869][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 783.917952][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 783.935540][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 783.953882][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 783.962240][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 783.970649][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 783.984906][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 783.993381][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 784.024137][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 784.032256][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 784.041463][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 784.049447][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 784.058276][T30897] device veth0_vlan entered promiscuous mode [ 784.082461][T30897] device veth1_macvtap entered promiscuous mode [ 784.213487][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 784.251265][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 784.314470][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 784.334915][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 784.364902][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 784.415504][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 784.550702][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 784.931772][T30955] bridge0: port 2(bridge_slave_1) entered disabled state [ 784.939126][T30955] bridge0: port 1(bridge_slave_0) entered disabled state [ 785.584116][T30977] device sit0 left promiscuous mode [ 785.966775][T30987] device syzkaller0 entered promiscuous mode [ 785.999624][T30988] device syzkaller0 entered promiscuous mode [ 786.236973][T31007] syz.8.8415[31007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 786.237027][T31007] syz.8.8415[31007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 786.869405][ T7] device bridge_slave_1 left promiscuous mode [ 786.996442][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 787.051912][ T7] device bridge_slave_0 left promiscuous mode [ 787.058330][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 787.469530][T31034] device macsec0 left promiscuous mode [ 790.102310][T31129] syz.8.8448[31129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 790.102397][T31129] syz.8.8448[31129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 791.918635][T31267] device syzkaller0 entered promiscuous mode [ 795.755204][T31434] device syzkaller0 entered promiscuous mode [ 796.103103][T31457] syz.6.8537[31457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 796.105567][T31457] syz.6.8537[31457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 796.370162][T31476] device veth1_macvtap entered promiscuous mode [ 796.465005][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 796.476925][T31481] : renamed from bond_slave_0 [ 796.785457][T31502] device syzkaller0 entered promiscuous mode [ 797.911269][T31571] device syzkaller0 entered promiscuous mode [ 797.937368][T31581] syz.6.8570[31581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 797.937458][T31581] syz.6.8570[31581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 798.409828][T31599] device syzkaller0 entered promiscuous mode [ 798.502868][T31603] device wg2 entered promiscuous mode [ 802.219494][T31713] device pim6reg1 entered promiscuous mode [ 802.299238][T31726] device pim6reg1 entered promiscuous mode [ 802.767714][T31760] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.775090][T31760] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.811784][T31760] device bridge_slave_0 entered promiscuous mode [ 802.838102][T31760] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.845318][T31760] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.853113][T31760] device bridge_slave_1 entered promiscuous mode [ 802.946028][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 802.955101][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 802.981226][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 802.992034][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 803.002273][ T1195] bridge0: port 1(bridge_slave_0) entered blocking state [ 803.009551][ T1195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 803.018871][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 803.027958][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 803.036256][ T1195] bridge0: port 2(bridge_slave_1) entered blocking state [ 803.043441][ T1195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 803.067074][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 803.080078][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 803.088873][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 803.118203][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 803.156084][T31760] device veth0_vlan entered promiscuous mode [ 803.172174][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 803.186165][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 803.203531][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 803.240326][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 803.251796][T31760] device veth1_macvtap entered promiscuous mode [ 803.269483][T31798] device syzkaller0 entered promiscuous mode [ 803.276289][ T4408] syzkaller0: tun_net_xmit 48 [ 803.286130][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 803.300194][T31799] device wg2 left promiscuous mode [ 803.314331][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 803.324146][T31798] syzkaller0: tun_net_xmit 1280 [ 803.330718][T31798] syzkaller0: create flow: hash 2972946754 index 1 [ 803.342496][T31799] device wg2 entered promiscuous mode [ 803.384601][T31797] syzkaller0: delete flow: hash 2972946754 index 1 [ 803.521664][T31817] ref_ctr_offset mismatch. inode: 0x77c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 803.647382][ T112] device veth0_to_team left promiscuous mode [ 803.653985][ T112] : port 1(veth0_to_team) entered disabled state [ 803.679498][ T112] device veth1_macvtap left promiscuous mode [ 803.856217][T31844] device syzkaller0 entered promiscuous mode [ 804.258317][T31883] device syzkaller0 entered promiscuous mode [ 806.274307][T31983] device syzkaller0 entered promiscuous mode [ 806.384900][T31986] device wg2 left promiscuous mode [ 806.431287][T31987] device wg2 entered promiscuous mode [ 806.702437][T31998] device sit0 entered promiscuous mode [ 809.561637][T32077] device pim6reg1 entered promiscuous mode [ 809.816928][T32084] device syzkaller0 left promiscuous mode [ 812.122066][T32207] device wg2 left promiscuous mode [ 814.061969][T32242] device vxcan1 entered promiscuous mode [ 814.231642][T32228] bridge0: port 1(bridge_slave_0) entered blocking state [ 814.238978][T32228] bridge0: port 1(bridge_slave_0) entered disabled state [ 814.249471][T32228] device bridge_slave_0 entered promiscuous mode [ 814.256385][T32228] bridge0: port 2(bridge_slave_1) entered blocking state [ 814.266010][T32228] bridge0: port 2(bridge_slave_1) entered disabled state [ 814.273469][T32228] device bridge_slave_1 entered promiscuous mode [ 814.405162][T32228] bridge0: port 2(bridge_slave_1) entered blocking state [ 814.412246][T32228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 814.419542][T32228] bridge0: port 1(bridge_slave_0) entered blocking state [ 814.426581][T32228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 814.681138][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 814.689057][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 814.696991][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 814.704531][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 814.722477][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 814.732415][ T1195] bridge0: port 1(bridge_slave_0) entered blocking state [ 814.739485][ T1195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 814.762239][T32282] syz.0.8763[32282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 814.762324][T32282] syz.0.8763[32282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 814.887474][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 814.907967][ T1195] bridge0: port 2(bridge_slave_1) entered blocking state [ 814.915097][ T1195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 815.035743][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 815.047707][ T112] GPL: port 1(erspan0) entered disabled state [ 815.056113][ T112] device erspan0 left promiscuous mode [ 815.063118][ T112] GPL: port 1(erspan0) entered disabled state [ 815.073439][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 815.145481][T32228] device veth0_vlan entered promiscuous mode [ 815.162553][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 815.171972][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 815.181114][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 815.190066][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 815.227015][T32228] device veth1_macvtap entered promiscuous mode [ 815.238605][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 815.247114][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 815.255613][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 815.267801][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 815.277134][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 815.338713][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 815.350828][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 815.417962][ T112] device veth0_to_team left promiscuous mode [ 815.467140][ T112] : port 1(veth0_to_team) entered disabled state [ 815.537565][ T112] device veth1 left promiscuous mode [ 815.597068][ T112] bridge0: port 3(veth1) entered disabled state [ 815.714606][ T112] device bridge_slave_1 left promiscuous mode [ 815.785591][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 815.864153][ T112] device bridge_slave_0 left promiscuous mode [ 815.916681][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 816.000315][ T112] device veth1_macvtap left promiscuous mode [ 816.240801][T32314] device syzkaller0 entered promiscuous mode [ 816.386180][T32318] device syzkaller0 entered promiscuous mode [ 816.454015][T32339] device syzkaller0 entered promiscuous mode [ 816.497874][T32353] device wg2 left promiscuous mode [ 816.688648][T32353] device wg2 entered promiscuous mode [ 816.699981][T32359] device veth0_vlan left promiscuous mode [ 816.708748][T32359] device veth0_vlan entered promiscuous mode [ 817.299171][T32396] device veth0_vlan left promiscuous mode [ 817.305141][T32396] device veth0_vlan entered promiscuous mode [ 817.351812][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 817.364697][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 817.440280][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 817.487487][T32419] device wg2 entered promiscuous mode [ 818.493714][T32448] device sit0 entered promiscuous mode [ 818.698167][T32451] device macsec0 entered promiscuous mode [ 819.158586][T32472] device wg2 entered promiscuous mode [ 819.705925][T32507] device syzkaller0 entered promiscuous mode [ 819.777186][T32546] device wg2 left promiscuous mode [ 822.156999][T32660] device veth0_vlan left promiscuous mode [ 822.165491][T32660] device veth0_vlan entered promiscuous mode [ 822.186432][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 822.216216][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 822.288579][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 822.446220][T32698] device pim6reg1 entered promiscuous mode [ 822.613235][T32697] device syzkaller0 entered promiscuous mode [ 822.990282][T32709] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.003644][T32709] bridge0: port 1(bridge_slave_0) entered disabled state [ 823.016413][T32709] device bridge_slave_0 entered promiscuous mode [ 823.033564][T32709] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.042470][T32709] bridge0: port 2(bridge_slave_1) entered disabled state [ 823.051400][T32709] device bridge_slave_1 entered promiscuous mode [ 823.078723][T32712] bridge0: port 2(bridge_slave_1) entered disabled state [ 823.086383][T32712] bridge0: port 1(bridge_slave_0) entered disabled state [ 823.260831][T32718] device sit0 left promiscuous mode [ 823.528446][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 823.566875][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 823.672368][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 823.690166][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 823.734309][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.741417][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 823.749227][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 823.762688][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 823.772395][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.779484][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 823.816853][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 823.826372][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 823.834727][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 823.843362][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 823.852225][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 823.893783][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 823.988874][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 823.997172][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 824.004863][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 824.074112][T32709] device veth0_vlan entered promiscuous mode [ 824.122908][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 824.137606][T32709] device veth1_macvtap entered promiscuous mode [ 824.167813][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 824.176212][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 824.199421][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 824.215457][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 824.418789][T32751] syz.9.8888[32751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 824.418851][T32751] syz.9.8888[32751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 824.474092][T32752] syz.6.8887[32752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 824.827966][T32751] device veth0_vlan left promiscuous mode [ 824.956733][T32751] device veth0_vlan entered promiscuous mode [ 828.080550][ T399] device syzkaller0 entered promiscuous mode [ 829.169825][ T478] device syzkaller0 entered promiscuous mode [ 829.383856][ T489] device wg2 left promiscuous mode [ 829.394313][ T492] device wg2 entered promiscuous mode [ 829.641610][ T491] device syzkaller0 entered promiscuous mode [ 829.785729][ T519] device syzkaller0 entered promiscuous mode [ 829.853541][ T531] device pim6reg1 entered promiscuous mode [ 830.333611][ T558] device syzkaller0 entered promiscuous mode [ 830.922247][ T574] device syzkaller0 entered promiscuous mode [ 832.957718][ T710] syz.9.8998[710] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 832.957817][ T710] syz.9.8998[710] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 832.970504][ T711] syz.9.8998[711] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 834.048158][ T772] bridge0: port 2(bridge_slave_1) entered disabled state [ 834.069665][ T772] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.678068][ T875] device pim6reg1 entered promiscuous mode [ 839.322357][ T880] device syzkaller0 entered promiscuous mode [ 839.503375][ T890] device wg2 left promiscuous mode [ 839.902131][ T911] device veth1_macvtap left promiscuous mode [ 839.918339][ T911] device macsec0 left promiscuous mode [ 840.058986][ T911] device veth1_macvtap entered promiscuous mode [ 840.237342][ T911] device macsec0 entered promiscuous mode [ 841.417871][ T954] device syzkaller0 entered promiscuous mode [ 841.750041][ T970] device sit0 entered promiscuous mode [ 844.086347][ T1031] cgroup: fork rejected by pids controller in /syz7 [ 845.266912][ T1148] device wg2 entered promiscuous mode [ 845.500173][ T1149] bridge0: port 1(bridge_slave_0) entered blocking state [ 845.600762][ T1149] bridge0: port 1(bridge_slave_0) entered disabled state [ 845.643373][ T1149] device bridge_slave_0 entered promiscuous mode [ 845.767063][ T1149] bridge0: port 2(bridge_slave_1) entered blocking state [ 845.916634][ T1149] bridge0: port 2(bridge_slave_1) entered disabled state [ 846.077009][ T1149] device bridge_slave_1 entered promiscuous mode [ 846.217758][ T1181] device syzkaller0 entered promiscuous mode [ 846.637010][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 846.655162][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 846.703893][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 846.806841][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 846.894747][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 846.901837][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 847.087726][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 847.149034][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 847.165923][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 847.173050][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 847.197512][ T1195] device bridge_slave_1 left promiscuous mode [ 847.204863][ T1195] bridge0: port 2(bridge_slave_1) entered disabled state [ 847.221942][ T1195] device bridge_slave_0 left promiscuous mode [ 847.234711][ T1195] bridge0: port 1(bridge_slave_0) entered disabled state [ 847.262880][ T1195] device veth1_macvtap left promiscuous mode [ 847.279244][ T1195] device veth0_vlan left promiscuous mode [ 847.551467][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 847.559681][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 847.578404][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 847.594563][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 847.611552][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 847.778520][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 847.840768][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 847.942224][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 847.991494][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 848.065851][ T1149] device veth0_vlan entered promiscuous mode [ 848.108481][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 848.137463][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 848.192254][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 848.207533][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 848.222081][ T1149] device veth1_macvtap entered promiscuous mode [ 848.232958][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 848.241614][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 848.252902][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 848.288796][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 848.313203][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 851.002849][ T1318] device syzkaller0 entered promiscuous mode [ 851.570900][ T1341] device pim6reg1 entered promiscuous mode [ 852.634300][ T1386] device pim6reg1 entered promiscuous mode [ 853.224534][ T1425] device wg2 left promiscuous mode [ 853.249313][ T1432] device wg2 entered promiscuous mode [ 853.427776][ T1436] device pim6reg1 entered promiscuous mode [ 853.827393][ T1438] device erspan0 left promiscuous mode [ 853.915468][ T1438] GPL: port 1(erspan0) entered disabled state [ 854.392706][ T1454] device syzkaller0 entered promiscuous mode [ 856.228652][ T1563] device veth1_to_team entered promiscuous mode [ 856.344491][ T1559] device wg2 entered promiscuous mode [ 856.491313][ T1575] ip6erspan0: tun_chr_ioctl cmd 1074025677 [ 856.536696][ T1575] ip6erspan0: linktype set to 805 [ 856.747874][ T1597] device syzkaller0 entered promiscuous mode [ 857.063151][ T1628] device sit0 entered promiscuous mode [ 859.137978][ T1716] device pim6reg1 entered promiscuous mode [ 859.361180][ T1739] syz.6.9256[1739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 859.361245][ T1739] syz.6.9256[1739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 861.228129][ T1849] syz.8.9286[1849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 861.356506][ T1849] syz.8.9286[1849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 861.482736][ T1849] syz.8.9286[1849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 861.506786][ T1849] syz.8.9286[1849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 864.397825][ T1991] device syzkaller0 entered promiscuous mode [ 864.697457][ T2015] device wg2 left promiscuous mode [ 864.704407][ T2015] device xfrm0 entered promiscuous mode [ 864.727393][ T2015] device wg2 entered promiscuous mode [ 865.600710][ T2084] syz.9.9352[2084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 865.606846][ T2084] syz.9.9352[2084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 865.933427][ T2122] device sit0 left promiscuous mode [ 866.071410][ T2130] device sit0 left promiscuous mode [ 866.564977][ T2178] device wg2 left promiscuous mode [ 866.701062][ T2178] device wg2 entered promiscuous mode [ 867.001484][ T2184] device syzkaller0 entered promiscuous mode [ 867.522684][ T2212] gretap0: refused to change device tx_queue_len [ 868.363318][ T2225] device pim6reg1 entered promiscuous mode [ 868.460339][ T2226] device wg2 left promiscuous mode [ 868.765004][ T2236] device veth1_to_team entered promiscuous mode [ 869.984220][ T2309] device pim6reg1 entered promiscuous mode [ 870.560055][ T2340] syz.7.9416[2340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 870.560142][ T2340] syz.7.9416[2340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 871.422101][ T2392] device sit0 entered promiscuous mode [ 873.981748][ T2474] device wg2 left promiscuous mode [ 874.027112][ T2474] device wg2 entered promiscuous mode [ 874.254279][ T2492] device pim6reg1 entered promiscuous mode [ 876.257810][ T2586] syz.0.9479[2586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 876.257864][ T2586] syz.0.9479[2586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 876.721625][ T2595] device syzkaller0 entered promiscuous mode [ 876.922959][ T2623] device veth0_vlan left promiscuous mode [ 877.010070][ T2623] device veth0_vlan entered promiscuous mode [ 877.154728][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 877.164025][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 877.239959][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 877.569551][ T2636] device syzkaller0 entered promiscuous mode [ 880.229699][ T2741] syz.6.9520[2741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 880.229748][ T2741] syz.6.9520[2741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 880.574711][ T2762] device wg2 entered promiscuous mode [ 880.926980][ T2776] device wg2 left promiscuous mode [ 881.733576][ T2809] device sit0 entered promiscuous mode [ 881.792745][ T2814] tap0: tun_chr_ioctl cmd 1074025677 [ 881.817062][ T2814] tap0: linktype set to 768 [ 882.820139][ T2862] tap0: tun_chr_ioctl cmd 1074025680 [ 882.825833][ T2863] tap0: tun_chr_ioctl cmd 1074025680 [ 882.839764][ T2862] device syzkaller0 entered promiscuous mode [ 882.964756][ T2888] cgroup: fork rejected by pids controller in /syz6 [ 884.359507][ T405] device bridge_slave_1 left promiscuous mode [ 884.366007][ T405] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.392831][ T405] device bridge_slave_0 left promiscuous mode [ 884.406688][ T405] bridge0: port 1(bridge_slave_0) entered disabled state [ 884.439075][ T405] device veth1_macvtap left promiscuous mode [ 884.597162][ T2929] bridge0: port 1(bridge_slave_0) entered blocking state [ 884.604307][ T2929] bridge0: port 1(bridge_slave_0) entered disabled state [ 884.615054][ T2929] device bridge_slave_0 entered promiscuous mode [ 884.632137][ T2929] bridge0: port 2(bridge_slave_1) entered blocking state [ 884.639374][ T2929] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.647438][ T2929] device bridge_slave_1 entered promiscuous mode [ 885.333943][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 885.349497][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 885.495840][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 885.504394][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 885.521829][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 885.529024][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 885.537098][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 885.565964][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 885.578145][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 885.585250][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 885.595690][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 885.615568][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 885.626386][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 885.645858][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 885.777518][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 885.936788][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 885.945223][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 887.863425][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 887.908161][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 887.965034][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 888.003862][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 888.014007][ T2929] device veth0_vlan entered promiscuous mode [ 888.068319][ T3013] device sit0 entered promiscuous mode [ 888.195598][ T2929] device veth1_macvtap entered promiscuous mode [ 888.235206][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 888.244763][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 888.331613][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 888.404379][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 888.433032][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 888.445388][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 888.454505][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 889.758364][ T3115] syz.7.9626[3115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 889.758447][ T3115] syz.7.9626[3115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 891.788186][ T3207] device pim6reg1 entered promiscuous mode [ 892.776861][ T3262] device veth1_macvtap left promiscuous mode [ 893.286994][ T3285] device macsec0 entered promiscuous mode [ 893.445542][ T3285] device veth1_macvtap entered promiscuous mode [ 893.558661][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 894.531636][ T3369] : port 1(veth0_to_team) entered blocking state [ 894.558061][ T3369] : port 1(veth0_to_team) entered disabled state [ 894.652621][ T3369] device veth0_to_team entered promiscuous mode [ 894.998918][ T3413] GPL: port 1(erspan0) entered blocking state [ 895.006067][ T3413] GPL: port 1(erspan0) entered disabled state [ 895.022825][ T3413] device erspan0 entered promiscuous mode [ 895.033386][ T3399] GPL: port 1(erspan0) entered blocking state [ 895.039741][ T3399] GPL: port 1(erspan0) entered forwarding state [ 895.258867][ T3412] device sit0 left promiscuous mode [ 896.874388][ T3443] device syzkaller0 entered promiscuous mode [ 897.205228][ T3499] tap0: tun_chr_ioctl cmd 2147767517 [ 897.532197][ T3523] device veth1_macvtap left promiscuous mode [ 897.551455][ T3522] device veth1_macvtap entered promiscuous mode [ 897.585013][ T3519] device syzkaller0 entered promiscuous mode [ 897.591992][ T3527] device veth1_macvtap left promiscuous mode [ 899.956302][ T3545] device syzkaller0 entered promiscuous mode [ 900.238760][ T3565] device wg2 left promiscuous mode [ 900.562159][ T3585] device pim6reg1 entered promiscuous mode [ 902.366043][ T3651] device pim6reg1 entered promiscuous mode [ 903.781743][ T3688] device pim6reg1 entered promiscuous mode [ 904.635126][ T3712] device syzkaller0 entered promiscuous mode [ 905.253546][ T3715] device pim6reg1 entered promiscuous mode [ 905.527975][ T3720] bridge0: port 2(bridge_slave_1) entered disabled state [ 905.535380][ T3720] bridge0: port 1(bridge_slave_0) entered disabled state [ 906.611990][ T3744] device wg2 entered promiscuous mode [ 907.502886][ T3757] bridge0: port 1(bridge_slave_0) entered blocking state [ 907.510264][ T3757] bridge0: port 1(bridge_slave_0) entered disabled state [ 907.522348][ T3757] device bridge_slave_0 entered promiscuous mode [ 907.724205][ T3757] bridge0: port 2(bridge_slave_1) entered blocking state [ 907.731688][ T3757] bridge0: port 2(bridge_slave_1) entered disabled state [ 907.739332][ T3757] device bridge_slave_1 entered promiscuous mode [ 907.857082][ T3757] bridge0: port 2(bridge_slave_1) entered blocking state [ 907.864182][ T3757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 907.871788][ T3757] bridge0: port 1(bridge_slave_0) entered blocking state [ 907.878824][ T3757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 907.904968][ T3796] device pim6reg1 entered promiscuous mode [ 908.077035][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 908.085348][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 908.093043][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 908.112662][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 908.121089][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 908.143464][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 908.150569][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 908.315016][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 908.349097][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 908.406864][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 908.413918][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 908.456811][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 908.486771][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 908.494822][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 908.503214][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 908.516458][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 908.527775][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 908.733975][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 908.751104][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 908.763995][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 908.773605][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 908.785628][ T3757] device veth0_vlan entered promiscuous mode [ 908.806368][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 908.946980][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 908.967503][ T3757] device veth1_macvtap entered promiscuous mode [ 909.093794][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 909.117494][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 909.153980][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 909.435785][ T3883] syz.7.9820[3883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 909.435846][ T3883] syz.7.9820[3883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 909.447980][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 909.497003][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 909.525169][ T3883] syz.7.9820[3883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 909.525273][ T3883] syz.7.9820[3883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 909.893247][ T3905] device pim6reg1 entered promiscuous mode [ 910.186251][ T3925] device syzkaller0 entered promiscuous mode [ 911.200280][ T3965] device veth1_macvtap left promiscuous mode [ 911.206406][ T3965] device macsec0 entered promiscuous mode [ 911.359164][ T3965] device veth1_macvtap entered promiscuous mode [ 911.671365][ T3977] device syzkaller0 entered promiscuous mode [ 914.380810][ T4059] device sit0 entered promiscuous mode [ 914.506044][ T4067] device syzkaller0 entered promiscuous mode [ 915.442700][ T4131] device syzkaller0 entered promiscuous mode [ 921.927750][ T4227] device sit0 left promiscuous mode [ 921.982835][ T4217] device sit0 entered promiscuous mode [ 922.054927][ T4232] device wg2 entered promiscuous mode [ 922.087904][ T4243] device wg2 left promiscuous mode [ 922.101902][ T4243] device wg2 entered promiscuous mode [ 922.148696][ T4252] device macsec0 left promiscuous mode [ 922.163795][ T4253] device veth1_macvtap entered promiscuous mode [ 922.171504][ T4253] device macsec0 entered promiscuous mode [ 922.179191][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 922.398515][ T4260] device wg2 entered promiscuous mode [ 923.024760][ T4296] device wg2 left promiscuous mode [ 923.457624][ T4317] syz.6.9941[4317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 923.457681][ T4317] syz.6.9941[4317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 925.045094][ T4403] device syzkaller0 entered promiscuous mode [ 925.544918][ T4438] bridge0: port 3(veth1) entered blocking state [ 925.577006][ T4438] bridge0: port 3(veth1) entered disabled state [ 925.671570][ T4438] device veth1 entered promiscuous mode [ 926.094064][ T4468] device syzkaller0 entered promiscuous mode [ 926.629990][ T4495] device pim6reg1 entered promiscuous mode [ 928.329090][ T4526] device veth0_vlan left promiscuous mode [ 928.387310][ T4526] device veth0_vlan entered promiscuous mode [ 930.612905][ T4551] device pim6reg1 entered promiscuous mode [ 931.236658][ T4621] @0: renamed from bond_slave_1 [ 931.663652][ T4658] device syzkaller0 entered promiscuous mode [ 932.435420][ T4688] device bond_slave_0 entered promiscuous mode [ 932.452601][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 932.461290][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 933.564395][ T4727] : renamed from vlan1 [ 934.505660][ T4762] device pim6reg1 entered promiscuous mode [ 935.000352][ T4775] : renamed from vlan1 [ 935.370208][ T4813] device macsec0 entered promiscuous mode [ 935.392219][ T4810] device wg2 left promiscuous mode [ 935.762007][ T4810] device veth1_to_team entered promiscuous mode [ 935.863967][ T4818] device wg2 entered promiscuous mode [ 936.570524][ T4845] device wg2 entered promiscuous mode [ 936.765544][ T4867] device syzkaller0 entered promiscuous mode [ 936.957128][ T4873] device wg2 left promiscuous mode [ 937.093683][ T4877] syz.0.10093[4877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 937.093818][ T4877] syz.0.10093[4877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 937.192098][ T4873] device wg2 entered promiscuous mode [ 937.317527][ T4889] device syzkaller0 entered promiscuous mode [ 937.997098][ T4920] device veth0_vlan left promiscuous mode [ 938.302957][ T4920] device veth0_vlan entered promiscuous mode [ 938.713096][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 938.767221][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 938.859219][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 940.287278][ T4969] device bond_slave_0 entered promiscuous mode [ 940.324647][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 940.427847][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 941.496190][ T4976] device pim6reg1 entered promiscuous mode [ 941.725867][ T4983] device wg2 left promiscuous mode [ 941.886310][ T5004] device wg2 left promiscuous mode [ 941.906794][ T5002] device pim6reg1 entered promiscuous mode [ 942.083669][ T5009] device syzkaller0 entered promiscuous mode [ 942.251967][ T5019] device wg2 entered promiscuous mode [ 942.400847][ T5034] device pim6reg1 entered promiscuous mode [ 942.492063][ T5034] device wg2 left promiscuous mode [ 943.058379][ T94] udevd[94]: worker [30664] terminated by signal 33 (Unknown signal 33) [ 943.079603][ T94] udevd[94]: worker [30664] failed while handling '/devices/virtual/block/loop8' [ 943.140914][ T5073] device pim6reg1 entered promiscuous mode [ 944.212016][ T5158] device wg2 left promiscuous mode [ 944.455448][ T5162] device sit0 left promiscuous mode [ 944.584819][ T5168] device sit0 entered promiscuous mode [ 944.802405][ T5173] device wg2 entered promiscuous mode [ 945.917411][ T5234] device pim6reg1 entered promiscuous mode [ 946.420980][ T5287] device wg2 entered promiscuous mode [ 946.803375][ T5308] : renamed from vlan1 [ 947.605783][ T5360] syz.7.10224[5360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 947.605837][ T5360] syz.7.10224[5360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 948.721188][ T5405] device syzkaller0 entered promiscuous mode [ 948.850125][ T5405] device syzkaller0 left promiscuous mode [ 949.294085][ T5437] syz.7.10248[5437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 949.294161][ T5437] syz.7.10248[5437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 949.445105][ T5437] device pim6reg1 entered promiscuous mode [ 949.571509][ T5444] device syzkaller0 entered promiscuous mode [ 950.419185][ T5449] device pim6reg1 entered promiscuous mode [ 950.615811][ T5458] device veth0_vlan left promiscuous mode [ 950.691129][ T5458] device veth0_vlan entered promiscuous mode [ 951.716728][ T5490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 951.951544][ T5500] Q6\bY4: renamed from lo [ 952.367615][ T5538] device wg2 entered promiscuous mode [ 952.484908][ T5543] device pim6reg1 entered promiscuous mode [ 953.502250][ T5605] device pim6reg1 entered promiscuous mode [ 953.628731][ T5610] syz.7.10295[5610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 956.654236][ T5699] device pim6reg1 entered promiscuous mode [ 957.551235][ T5719] : renamed from vlan0 [ 957.623786][ T5728] syz.6.10326[5728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 957.623842][ T5728] syz.6.10326[5728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 957.671724][ T5728] syz.6.10326[5728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 957.706131][ T5728] syz.6.10326[5728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 957.722465][ T5734] device syzkaller0 entered promiscuous mode [ 958.094704][ T5747] device syzkaller0 entered promiscuous mode [ 959.606207][ T5820] syz.6.10353[5820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 959.606268][ T5820] syz.6.10353[5820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 960.472206][ T5837] device veth1_macvtap left promiscuous mode [ 961.205764][ T5873] device syzkaller0 entered promiscuous mode [ 962.403651][ T5917] device pim6reg1 entered promiscuous mode [ 963.990791][ T5940] device syzkaller0 entered promiscuous mode [ 964.388593][ T5947] syz.9.10385[5947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 964.429576][ T5947] syz.9.10385[5947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.454594][ T6021] device pim6reg1 entered promiscuous mode [ 965.664082][ T6045] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 965.676021][ T6045] pim6reg0: linktype set to 530 [ 965.750937][ T6070] syz.0.10420[6070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.750990][ T6070] syz.0.10420[6070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.751008][ T6071] syz.0.10420[6071] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.774533][ T6070] syz.0.10420[6070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 970.849069][ T6256] geneve1: tun_chr_ioctl cmd 1074025672 [ 970.947444][ T6256] geneve1: ignored: set checksum enabled [ 972.207952][ T6287] device syzkaller0 entered promiscuous mode [ 973.279480][ T6394] device syzkaller0 entered promiscuous mode [ 973.575031][ T6424] syz.6.10519[6424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 973.575078][ T6424] syz.6.10519[6424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 975.458535][ T6487] device pim6reg1 entered promiscuous mode [ 980.357317][ T6682] bridge0: port 2(bridge_slave_1) entered blocking state [ 980.364430][ T6682] bridge0: port 2(bridge_slave_1) entered forwarding state [ 980.379568][ T6682] device bridge0 entered promiscuous mode [ 980.849260][ T6718] device pim6reg1 entered promiscuous mode [ 980.959455][ T6731] tap0: tun_chr_ioctl cmd 1074025677 [ 980.968736][ T6731] tap0: linktype set to 825 [ 981.356832][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 981.397068][ T6746] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.404279][ T6746] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.357105][ T6807] device wg2 entered promiscuous mode [ 982.462403][ T6816] device wg2 left promiscuous mode [ 982.535906][ T6816] device wg2 entered promiscuous mode [ 983.502626][ T6855] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 983.508503][ T6855] pim6reg0: linktype set to 530 [ 983.526038][ T6855] device pim6reg1 entered promiscuous mode [ 983.699350][ T6863] device syzkaller0 entered promiscuous mode [ 983.801975][ T6869] device syzkaller0 entered promiscuous mode [ 984.161209][ T6878] device syzkaller0 entered promiscuous mode [ 984.334382][ T6902] device wg2 left promiscuous mode [ 984.638833][ T6926] device syzkaller0 entered promiscuous mode [ 985.380838][ T6966] device sit0 left promiscuous mode [ 985.706026][ T7000] syz.9.10674[7000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 985.706083][ T7000] syz.9.10674[7000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 986.836499][ T7072] device pim6reg1 entered promiscuous mode [ 987.378812][ T7104] syz.8.10702[7104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 987.389712][ T7104] syz.8.10702[7104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 987.490341][ T7112] device syzkaller0 entered promiscuous mode [ 988.921890][ T7195] device pim6reg1 entered promiscuous mode [ 989.041778][ T7204] device syzkaller0 entered promiscuous mode [ 991.412766][ T7338] device pim6reg1 entered promiscuous mode [ 991.486635][ T7345] syz.0.10774[7345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 991.486723][ T7345] syz.0.10774[7345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 992.801420][ T7392] syz.9.10787[7392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 992.889872][ T7389] device syzkaller0 entered promiscuous mode [ 992.907761][ T7392] syz.9.10787[7392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 993.084663][ T7392] device wg2 entered promiscuous mode [ 993.456866][ T7408] device wg2 left promiscuous mode [ 993.537543][ T7408] device wg2 entered promiscuous mode [ 993.743793][ T7420] device syzkaller0 entered promiscuous mode [ 994.213086][ T7432] device syzkaller0 entered promiscuous mode [ 994.353418][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 994.477769][ T7458] device pim6reg1 entered promiscuous mode [ 994.547240][ T7463] device bridge_slave_1 left promiscuous mode [ 994.568318][ T7463] bridge0: port 2(bridge_slave_1) entered disabled state [ 994.578177][ T7463] device bridge_slave_0 left promiscuous mode [ 994.607047][ T7463] bridge0: port 1(bridge_slave_0) entered disabled state [ 994.761091][ T7469] device pim6reg1 entered promiscuous mode [ 994.823945][ T7471] device syzkaller0 entered promiscuous mode [ 996.487576][ T7530] device pim6reg1 entered promiscuous mode [ 996.961714][ T7550] syz.8.10831[7550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 996.961773][ T7550] syz.8.10831[7550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 997.184063][ T7548] device pim6reg1 entered promiscuous mode [ 1000.901477][ T7642] syz.8.10855[7642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1000.901550][ T7642] syz.8.10855[7642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1001.605176][ T7693] : renamed from pim6reg1 [ 1001.624575][ T7681] device veth1_macvtap left promiscuous mode [ 1002.513874][ T7747] device veth0_vlan left promiscuous mode [ 1002.532326][ T7747] device veth0_vlan entered promiscuous mode [ 1002.649505][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1002.658061][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1002.665742][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1003.938152][ T7827] GPL: port 1(erspan0) entered blocking state [ 1003.944294][ T7827] GPL: port 1(erspan0) entered disabled state [ 1004.035149][ T7827] device erspan0 entered promiscuous mode [ 1006.261801][ T7923] device syzkaller0 entered promiscuous mode [ 1007.539996][ T7974] tun0: tun_chr_ioctl cmd 1074025676 [ 1007.545388][ T7974] tun0: owner set to 0 [ 1008.775750][ T8042] device wg2 entered promiscuous mode [ 1008.813755][ T8052] device wg2 left promiscuous mode [ 1008.847785][ T8052] device wg2 entered promiscuous mode [ 1009.380953][ T8089] device wg2 left promiscuous mode [ 1009.751741][ T8089] device wg2 entered promiscuous mode [ 1009.866132][ T8098] syz.9.10984[8098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1009.866212][ T8098] syz.9.10984[8098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1009.918605][ T8100] device syzkaller0 left promiscuous mode [ 1010.129271][ T8123] device wg2 left promiscuous mode [ 1010.284528][ T8134] device syzkaller0 entered promiscuous mode [ 1011.699343][ T8213] device veth1_macvtap left promiscuous mode [ 1013.330399][ T8268] device pim6reg1 entered promiscuous mode [ 1017.288562][ T8347] device syzkaller0 entered promiscuous mode [ 1017.658542][ T8361] device veth0_vlan left promiscuous mode [ 1017.722705][ T8361] device veth0_vlan entered promiscuous mode [ 1017.852812][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1017.874880][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1017.897068][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1018.345584][ T8382] device pim6reg1 entered promiscuous mode [ 1020.557203][ T8447] wlan0: tun_chr_ioctl cmd 1074025675 [ 1020.562663][ T8447] wlan0: persist disabled [ 1021.505440][ T8517] wlan0: tun_chr_ioctl cmd 1074025675 [ 1021.595287][ T8517] wlan0: persist disabled [ 1021.842324][ T8538] syz.6.11099[8538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1021.842496][ T8538] syz.6.11099[8538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1021.882420][ T8537] device veth0_vlan left promiscuous mode [ 1022.230247][ T8537] device veth0_vlan entered promiscuous mode [ 1022.632649][ T8549] device pim6reg1 entered promiscuous mode [ 1023.957305][ T8586] device pim6reg1 entered promiscuous mode [ 1025.827761][ T8641] device syzkaller0 entered promiscuous mode [ 1026.983288][ T8690] device syzkaller0 entered promiscuous mode [ 1027.083235][ T8692] device pim6reg1 entered promiscuous mode [ 1027.170149][ T8685] device syzkaller0 entered promiscuous mode [ 1027.344888][ T8710] device sit0 left promiscuous mode [ 1027.475664][ T8710] device sit0 entered promiscuous mode [ 1027.698124][ T8743] device pim6reg1 entered promiscuous mode [ 1027.943045][ T8753] device wg2 left promiscuous mode [ 1027.976873][ T8753] device pim6reg1 entered promiscuous mode [ 1028.224815][ T8762] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 1028.296148][ T8761] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 1029.220539][ T24] audit: type=1400 audit(1756318953.929:175): avc: denied { attach_queue } for pid=8813 comm="syz.7.11181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1029.382559][ T8816] device pim6reg1 entered promiscuous mode [ 1029.768811][ T8841] device sit0 left promiscuous mode [ 1029.781457][ T8841] device sit0 entered promiscuous mode [ 1029.976368][ T8870] device veth0_vlan left promiscuous mode [ 1029.984037][ T8870] device veth0_vlan entered promiscuous mode [ 1029.992920][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1030.008136][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1030.017596][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1030.207647][ T8885] device syzkaller0 entered promiscuous mode [ 1030.261000][ T8884] device syzkaller0 entered promiscuous mode [ 1030.384133][ T8894] device sit0 entered promiscuous mode [ 1030.530743][ T8905] device veth1_macvtap left promiscuous mode [ 1030.542209][ T8905] device macsec0 left promiscuous mode [ 1030.671785][ T8915] device veth1_macvtap entered promiscuous mode [ 1030.678165][ T8915] device macsec0 entered promiscuous mode [ 1033.016173][ T9028] device veth0_vlan left promiscuous mode [ 1033.023263][ T9028] device veth0_vlan entered promiscuous mode [ 1033.031648][ T9034] : renamed from team_slave_1 [ 1033.265159][ T9060] device syzkaller0 entered promiscuous mode [ 1034.543217][ T9113] device syzkaller0 left promiscuous mode [ 1034.831848][ T9137] device sit0 entered promiscuous mode [ 1035.655091][ T9144] device sit0 left promiscuous mode [ 1036.808725][ T9221] device veth0_vlan left promiscuous mode [ 1036.815024][ T9221] device veth0_vlan entered promiscuous mode [ 1036.860157][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1036.971843][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1037.071318][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1038.191628][ T9239] device syzkaller0 entered promiscuous mode [ 1039.445824][ T9334] device pim6reg1 entered promiscuous mode [ 1039.665642][ T9342] device pim6reg1 entered promiscuous mode [ 1040.550866][ T9395] syz.9.11341[9395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1040.550926][ T9395] syz.9.11341[9395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1040.752795][ T9400] device syzkaller0 entered promiscuous mode [ 1041.017257][ T9418] device wg2 entered promiscuous mode [ 1043.043654][ T9488] 0: renamed from pim6reg1 [ 1043.651477][ T9507] device sit0 left promiscuous mode [ 1044.311721][ T9510] device sit0 entered promiscuous mode [ 1044.616063][ T9535] device wg2 left promiscuous mode [ 1045.445476][ T9596] device pim6reg1 entered promiscuous mode [ 1045.571704][ T9612] device syzkaller0 entered promiscuous mode [ 1045.625824][ T9613] bridge0: port 1(bridge_slave_0) entered blocking state [ 1045.654323][ T9613] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.678863][ T9613] device bridge_slave_0 entered promiscuous mode [ 1045.704788][ T9622] device wg2 entered promiscuous mode [ 1045.710977][ T9613] bridge0: port 2(bridge_slave_1) entered blocking state [ 1045.719016][ T9613] bridge0: port 2(bridge_slave_1) entered disabled state [ 1045.726698][ T9613] device bridge_slave_1 entered promiscuous mode [ 1045.849980][ T9613] bridge0: port 2(bridge_slave_1) entered blocking state [ 1045.857098][ T9613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1045.864378][ T9613] bridge0: port 1(bridge_slave_0) entered blocking state [ 1045.871418][ T9613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1045.907257][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1045.921261][ T1195] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.937585][ T1195] bridge0: port 2(bridge_slave_1) entered disabled state [ 1045.970993][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1045.981335][ T1195] bridge0: port 1(bridge_slave_0) entered blocking state [ 1045.988590][ T1195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1046.002421][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1046.010776][ T1195] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.017946][ T1195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1046.061227][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1046.099799][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1046.261989][ T9664] bridge0: port 2(bridge_slave_1) entered disabled state [ 1046.279366][ T9664] bridge0: port 1(bridge_slave_0) entered disabled state [ 1046.345100][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1046.372531][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1046.387010][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1046.394683][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1046.410843][ T9613] device veth0_vlan entered promiscuous mode [ 1046.436879][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1046.461769][ T9613] device veth1_macvtap entered promiscuous mode [ 1046.532173][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1046.587374][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1046.602970][ T1195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1046.709709][ T9694] device pim6reg1 entered promiscuous mode [ 1047.230894][ T9710] device pim6reg1 entered promiscuous mode [ 1047.588589][ T296] GPL: port 1(erspan0) entered disabled state [ 1047.704153][ T296] device erspan0 left promiscuous mode [ 1047.750086][ T296] GPL: port 1(erspan0) entered disabled state [ 1048.897244][ T296] device bridge_slave_1 left promiscuous mode [ 1048.903444][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 1049.027785][ T296] device bridge_slave_0 left promiscuous mode [ 1049.033947][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 1049.186808][ T296] device veth1_macvtap left promiscuous mode [ 1049.433416][ T9797] device macsec0 entered promiscuous mode [ 1049.458216][ T9807] syz.6.11461[9807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1049.458274][ T9807] syz.6.11461[9807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1049.504108][ T9809] : renamed from pim6reg1 [ 1050.208148][ T9852] Q6`Ҙ: renamed from lo [ 1050.275304][ T9850] device syzkaller0 entered promiscuous mode [ 1050.774906][ T9873] device macsec0 left promiscuous mode [ 1051.221735][ T9912] device wg2 left promiscuous mode [ 1052.669961][ T9974] device wg2 entered promiscuous mode [ 1053.037145][ T9978] device sit0 entered promiscuous mode [ 1053.112584][ T9981] device veth0_vlan left promiscuous mode [ 1053.132796][ T9981] device veth0_vlan entered promiscuous mode [ 1053.591051][T10045] device wg2 left promiscuous mode [ 1053.656824][T10039] device wg2 entered promiscuous mode [ 1053.956909][T10078] device veth1_macvtap left promiscuous mode [ 1053.963057][T10078] device macsec0 entered promiscuous mode [ 1054.760463][T10157] device syzkaller0 left promiscuous mode [ 1054.840847][T10166] tap0: tun_chr_ioctl cmd 1074025677 [ 1054.851282][T10166] tap0: linktype set to 773 [ 1055.792456][T10212] device syzkaller0 entered promiscuous mode [ 1057.385357][T10267] device sit0 entered promiscuous mode [ 1058.066091][T10266] device pim6reg1 entered promiscuous mode [ 1058.425615][T10287] device syzkaller0 entered promiscuous mode [ 1059.483236][T10337] device syzkaller0 entered promiscuous mode [ 1060.857098][T10357] device pim6reg1 entered promiscuous mode [ 1061.643617][T10396] syz.8.11621[10396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1061.643669][T10396] syz.8.11621[10396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1062.004150][T10423] device macsec0 left promiscuous mode [ 1062.589211][T10470] bridge0: port 2(bridge_slave_1) entered disabled state [ 1062.621858][T10470] device bridge0 left promiscuous mode [ 1062.808074][T10474] device macsec0 entered promiscuous mode [ 1062.815870][T10475] device bridge_slave_1 left promiscuous mode [ 1062.833351][T10475] bridge0: port 2(bridge_slave_1) entered disabled state [ 1062.856195][T10475] device bridge_slave_0 left promiscuous mode [ 1062.879475][T10475] bridge0: port 1(bridge_slave_0) entered disabled state [ 1064.854456][T10598] syz.7.11680[10598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1064.854549][T10598] syz.7.11680[10598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1065.025839][T10598] syz.7.11680[10598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1065.042147][T10598] syz.7.11680[10598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1065.901107][T10622] device syzkaller0 entered promiscuous mode [ 1067.669327][T10681] device pim6reg1 entered promiscuous mode [ 1067.957478][T10687] : renamed from vlan0 [ 1068.652020][T10712] device wg2 left promiscuous mode [ 1068.762500][T10712] device wg2 entered promiscuous mode [ 1072.626968][T10882] device sit0 left promiscuous mode [ 1072.746992][T10888] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1073.108527][T10903] gretap0: refused to change device tx_queue_len [ 1073.354280][T10906] device pim6reg1 entered promiscuous mode [ 1073.464669][T10912] device veth0_vlan left promiscuous mode [ 1073.486180][T10912] device veth0_vlan entered promiscuous mode [ 1073.552928][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1073.567342][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1073.575141][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1073.609590][T10929] device wg2 left promiscuous mode [ 1073.638506][T10929] device wg2 entered promiscuous mode [ 1073.652068][T10929] device pim6reg1 entered promiscuous mode [ 1073.893692][T10977] device sit0 left promiscuous mode [ 1074.541381][T10997] device pim6reg1 entered promiscuous mode [ 1074.695524][T11028] device pim6reg1 entered promiscuous mode [ 1075.001584][T11042] device syzkaller0 entered promiscuous mode [ 1075.157504][T11064] device sit0 left promiscuous mode [ 1075.987398][T11069] device sit0 entered promiscuous mode [ 1077.075484][T11124] device sit0 entered promiscuous mode [ 1077.679414][T11136] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1077.967191][T11180] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 1078.321450][T11180] device syzkaller0 entered promiscuous mode [ 1078.369757][T11208] device sit0 entered promiscuous mode [ 1078.395428][T11197] bridge0: port 1(bridge_slave_0) entered blocking state [ 1078.403080][T11197] bridge0: port 1(bridge_slave_0) entered disabled state [ 1078.410566][T11197] device bridge_slave_0 entered promiscuous mode [ 1078.417941][T11197] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.426745][T11197] bridge0: port 2(bridge_slave_1) entered disabled state [ 1078.435744][T11197] device bridge_slave_1 entered promiscuous mode [ 1078.617164][T11208] device syzkaller0 entered promiscuous mode [ 1078.676044][T11197] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.683134][T11197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1078.690415][T11197] bridge0: port 1(bridge_slave_0) entered blocking state [ 1078.697439][T11197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1078.750877][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 1078.767073][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 1078.780168][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1078.788681][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1078.830727][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1078.850148][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 1078.857618][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1078.887199][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1078.895550][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.902606][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1078.951969][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1079.054026][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1079.119943][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1079.153943][T11197] device veth0_vlan entered promiscuous mode [ 1079.160532][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1079.170184][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1079.178585][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1079.206540][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1079.216453][T11197] device veth1_macvtap entered promiscuous mode [ 1079.245576][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1079.548956][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1079.566237][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1079.738614][T11274] device veth0_vlan left promiscuous mode [ 1079.780593][T11274] device veth0_vlan entered promiscuous mode [ 1079.830496][T10983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1079.847988][T10983] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1079.863386][T10983] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1080.407968][ T405] device erspan0 left promiscuous mode [ 1080.413463][ T405] GPL: port 1(erspan0) entered disabled state [ 1081.213275][T11367] device pim6reg1 entered promiscuous mode [ 1081.275390][T11383] device veth0_vlan left promiscuous mode [ 1081.287656][T11383] device veth0_vlan entered promiscuous mode [ 1081.295099][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1081.313852][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1081.375848][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1082.145981][T11427] device pim6reg1 entered promiscuous mode [ 1086.495816][T11493] device syzkaller0 entered promiscuous mode [ 1086.740580][T11514] device pim6reg1 entered promiscuous mode [ 1087.168366][T11535] device pim6reg1 entered promiscuous mode [ 1088.425456][T11586] device macsec0 left promiscuous mode [ 1088.482480][T11587] device veth1_macvtap entered promiscuous mode [ 1088.556689][T11587] device macsec0 entered promiscuous mode [ 1088.668924][T10983] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1089.613478][T11632] device wg2 left promiscuous mode [ 1090.104580][T11668] bridge0: port 1(bridge_slave_0) entered blocking state [ 1090.151291][T11668] bridge0: port 1(bridge_slave_0) entered disabled state [ 1090.292866][T11668] device bridge_slave_0 entered promiscuous mode [ 1090.343644][T11668] bridge0: port 2(bridge_slave_1) entered blocking state [ 1090.354317][T11668] bridge0: port 2(bridge_slave_1) entered disabled state [ 1090.369583][T11668] device bridge_slave_1 entered promiscuous mode [ 1090.562295][T11668] bridge0: port 2(bridge_slave_1) entered blocking state [ 1090.569549][T11668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1090.576954][T11668] bridge0: port 1(bridge_slave_0) entered blocking state [ 1090.584012][T11668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1090.731184][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1090.760222][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 1090.767710][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 1090.815343][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1090.827037][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 1090.834099][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1090.856791][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1090.873182][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 1090.880265][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1090.913435][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1090.946906][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1090.978636][T11720] bridge0: port 2(bridge_slave_1) entered disabled state [ 1090.985934][T11720] bridge0: port 1(bridge_slave_0) entered disabled state [ 1090.997946][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1091.010968][T11731] device bridge_slave_1 left promiscuous mode [ 1091.017560][T11731] bridge0: port 2(bridge_slave_1) entered disabled state [ 1091.025468][T11731] device bridge_slave_0 left promiscuous mode [ 1091.031933][T11731] bridge0: port 1(bridge_slave_0) entered disabled state [ 1091.088452][T11716] device syzkaller0 entered promiscuous mode [ 1091.100639][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1091.116302][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1091.137213][T11668] device veth0_vlan entered promiscuous mode [ 1091.155154][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1091.171844][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1091.207343][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1091.215705][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1091.244399][T11668] device veth1_macvtap entered promiscuous mode [ 1091.263113][T11736] device pim6reg1 entered promiscuous mode [ 1091.293760][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1091.306074][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1091.406156][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1091.450938][T11752] syz.0.11992[11752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1091.451042][T11752] syz.0.11992[11752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1091.508316][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1091.619226][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1091.633766][T11760] syz.7.11993[11760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1091.633857][T11760] syz.7.11993[11760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1092.338633][T11761] device pim6reg1 entered promiscuous mode [ 1092.405894][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): pim6reg1: link becomes ready [ 1092.969537][T11807] device wg2 entered promiscuous mode [ 1093.785779][T11835] device veth0_vlan left promiscuous mode [ 1093.792458][T11835] device veth0_vlan entered promiscuous mode [ 1093.801976][T11837] device veth0_vlan left promiscuous mode [ 1093.819563][T11837] device veth0_vlan entered promiscuous mode [ 1093.892184][ T405] device veth1_macvtap left promiscuous mode [ 1093.901049][ T405] device veth0_vlan left promiscuous mode [ 1094.441209][T11870] device pim6reg1 entered promiscuous mode [ 1094.718170][T11887] device pim6reg1 entered promiscuous mode [ 1096.141967][T11927] device syzkaller0 entered promiscuous mode [ 1097.601706][T11968] syz.8.12053[11968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1097.602075][T11968] syz.8.12053[11968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1100.299667][T12070] : renamed from vlan0 [ 1101.028578][T12095] device macsec0 entered promiscuous mode [ 1101.325624][T12101] device macsec0 left promiscuous mode [ 1101.591432][T12125] device wg2 left promiscuous mode [ 1102.092264][T12127] device wg2 entered promiscuous mode [ 1102.517305][T12174] device wg2 entered promiscuous mode [ 1104.912803][T12242] device macsec0 entered promiscuous mode [ 1105.005973][T12247] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1105.011861][T12247] syzkaller0: linktype set to 804 [ 1105.232128][T12265] device syzkaller0 entered promiscuous mode [ 1105.252261][T12263] device veth0_vlan left promiscuous mode [ 1105.339877][T12263] device veth0_vlan entered promiscuous mode [ 1105.607835][T12267] device veth0_vlan left promiscuous mode [ 1105.686547][T12267] device veth0_vlan entered promiscuous mode [ 1105.715821][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1105.750272][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1105.809021][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1106.166193][T12299] device veth0_vlan left promiscuous mode [ 1106.178959][T12299] device veth0_vlan entered promiscuous mode [ 1106.278345][T12302] device syzkaller0 entered promiscuous mode [ 1106.301039][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1106.309450][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1106.317389][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1106.704862][T12308] device syzkaller0 entered promiscuous mode [ 1106.938979][T12319] device wg2 left promiscuous mode [ 1108.133961][T12367] device veth0_vlan left promiscuous mode [ 1108.148837][T12367] device veth0_vlan entered promiscuous mode [ 1108.217087][T12376] device veth0_vlan left promiscuous mode [ 1108.311511][T12376] device veth0_vlan entered promiscuous mode [ 1108.484092][T10983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1108.514992][T10983] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1108.543125][T10983] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1108.899951][T12408] device macsec0 left promiscuous mode [ 1110.348631][T12462] device sit0 entered promiscuous mode [ 1110.424850][T12482] syz.8.12183[12482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1110.424944][T12482] syz.8.12183[12482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1111.009946][T12500] device syzkaller0 entered promiscuous mode [ 1111.048069][T12501] device veth0_vlan left promiscuous mode [ 1111.061210][T12501] device veth0_vlan entered promiscuous mode [ 1111.505308][T12526] bridge0: port 2(bridge_slave_1) entered disabled state [ 1111.520223][T12526] bridge0: port 1(bridge_slave_0) entered disabled state [ 1112.189084][T12560] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 1112.270340][T12553] device macsec0 entered promiscuous mode [ 1113.245427][T12601] device sit0 entered promiscuous mode [ 1113.895107][T12628] device syzkaller0 entered promiscuous mode [ 1113.971710][T12637] device pim6reg1 entered promiscuous mode [ 1114.020751][T12641] device pim6reg1 entered promiscuous mode [ 1114.192406][T12644] device veth1_macvtap left promiscuous mode [ 1114.198701][T12644] device macsec0 entered promiscuous mode [ 1114.427922][T12668] device wg2 left promiscuous mode [ 1114.570911][T12668] device wg2 entered promiscuous mode [ 1114.805830][T12685] device syzkaller0 entered promiscuous mode [ 1114.986235][T12705] device veth1_macvtap left promiscuous mode [ 1115.001399][T12705] device macsec0 entered promiscuous mode [ 1115.298759][T12718] device syzkaller0 entered promiscuous mode [ 1117.308292][T12832] syz.9.12286[12832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1117.308350][T12832] syz.9.12286[12832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1117.441442][ T24] audit: type=1400 audit(1756319042.149:176): avc: denied { setattr } for pid=12836 comm="syz.6.12288" path="pipe:[137022]" dev="pipefs" ino=137022 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1118.014768][T12873] device syzkaller0 entered promiscuous mode [ 1118.200692][T12882] device pim6reg1 entered promiscuous mode [ 1118.213801][T12883] device wg2 entered promiscuous mode [ 1118.247162][T12885] device pim6reg1 entered promiscuous mode [ 1118.267897][T12887] device pim6reg1 entered promiscuous mode [ 1118.498442][T12898] device wg2 left promiscuous mode [ 1119.602460][T12926] syz.6.12314[12926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1119.602517][T12926] syz.6.12314[12926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1120.068736][T12946] device veth0_vlan left promiscuous mode [ 1120.160222][T12946] device veth0_vlan entered promiscuous mode [ 1120.185592][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1120.194831][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1120.202778][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1120.225172][T12955] device sit0 left promiscuous mode [ 1120.535264][T12996] device syzkaller0 entered promiscuous mode [ 1120.808087][T13015] device syzkaller0 entered promiscuous mode [ 1122.098252][T13108] device wg2 left promiscuous mode [ 1122.273082][T13120] syz.0.12364[13120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1122.273165][T13120] syz.0.12364[13120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1122.300272][T13108] device wg2 entered promiscuous mode [ 1122.654474][T13130] device pim6reg1 left promiscuous mode [ 1122.720123][T13132] @: renamed from bond_slave_0 [ 1122.890543][T13132] device syzkaller0 entered promiscuous mode [ 1123.106463][T13149] device veth0_vlan left promiscuous mode [ 1123.228848][T13149] device veth0_vlan entered promiscuous mode [ 1123.745525][T13189] @: renamed from bond_slave_0 [ 1123.845467][T13189] device syzkaller0 entered promiscuous mode [ 1125.004203][T13250] device veth0_vlan left promiscuous mode [ 1125.025384][T13250] device veth0_vlan entered promiscuous mode [ 1125.083115][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1125.115337][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1125.137585][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1126.143058][T13311] device syzkaller0 entered promiscuous mode [ 1130.185877][T13494] device pim6reg1 entered promiscuous mode [ 1130.198993][T13502] device veth0_vlan left promiscuous mode [ 1130.205009][T13502] device veth0_vlan entered promiscuous mode [ 1130.218614][T10983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1130.230424][T10983] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1130.241500][T10983] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1130.432575][T13516] device pim6reg1 entered promiscuous mode [ 1130.491474][T13529] device pim6reg1 entered promiscuous mode [ 1131.029704][T13583] device pim6reg1 entered promiscuous mode [ 1133.124304][T13682] bridge0: port 1(bridge_slave_0) entered blocking state [ 1133.173280][T13682] bridge0: port 1(bridge_slave_0) entered disabled state [ 1133.195607][T13682] device bridge_slave_0 entered promiscuous mode [ 1133.607331][T13682] bridge0: port 2(bridge_slave_1) entered blocking state [ 1133.625182][T13682] bridge0: port 2(bridge_slave_1) entered disabled state [ 1133.662948][T13682] device bridge_slave_1 entered promiscuous mode [ 1134.017924][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1134.029259][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1134.038166][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1134.049792][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1134.063807][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 1134.070984][ T405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1134.078994][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1134.089523][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1134.098353][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1134.108222][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 1134.115371][ T405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1134.129929][T13727] device syzkaller0 entered promiscuous mode [ 1134.152661][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1134.185294][T13682] device veth0_vlan entered promiscuous mode [ 1134.203889][T13682] device veth1_macvtap entered promiscuous mode [ 1134.241844][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1134.250382][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1134.260085][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1134.278123][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1134.285701][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1134.299106][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1134.331576][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1134.377910][T13765] syz.8.12543[13765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1134.378003][T13765] syz.8.12543[13765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1134.386196][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1135.250976][ T296] device veth1 left promiscuous mode [ 1135.256531][ T296] bridge0: port 3(veth1) entered disabled state [ 1135.264719][ T296] device bridge_slave_1 left promiscuous mode [ 1135.271503][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 1135.287461][ T296] device bridge_slave_0 left promiscuous mode [ 1135.293892][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 1135.935234][T13850] device pim6reg1 entered promiscuous mode [ 1138.048176][T13927] device syzkaller0 entered promiscuous mode [ 1138.496127][T13986] device pim6reg1 entered promiscuous mode [ 1138.535264][T13993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1138.542426][T13993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1139.381008][T14054] device syzkaller0 entered promiscuous mode [ 1140.229878][T14114] : renamed from vlan1 [ 1142.148928][T14180] device syzkaller0 entered promiscuous mode [ 1142.215942][T14201] device pim6reg1 entered promiscuous mode [ 1142.942858][T14233] : renamed from vlan0 [ 1143.743691][T14274] device veth0_vlan left promiscuous mode [ 1143.847173][T14274] device veth0_vlan entered promiscuous mode [ 1144.333414][T14315] device veth1_macvtap entered promiscuous mode [ 1144.348727][T14315] device macsec0 entered promiscuous mode [ 1144.358872][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1145.789257][T14413] device pim6reg1 left promiscuous mode [ 1145.918808][T14430] device veth0_vlan left promiscuous mode [ 1145.981509][T14430] device veth0_vlan entered promiscuous mode [ 1146.095441][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1146.127258][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1146.135204][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1146.204155][T14437] device veth0_vlan left promiscuous mode [ 1146.264693][T14437] device veth0_vlan entered promiscuous mode [ 1146.422134][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1146.430839][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1146.438844][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1149.882775][T14637] device syzkaller0 entered promiscuous mode [ 1149.989018][T14649] syz.6.12778[14649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1149.989098][T14649] syz.6.12778[14649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1150.001437][T14648] syz.6.12778[14648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1150.014187][T14648] syz.6.12778[14648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1150.931514][T14702] device sit0 left promiscuous mode [ 1151.673802][T14707] device veth1_macvtap left promiscuous mode [ 1151.693061][T14707] device macsec0 left promiscuous mode [ 1151.960527][T14716] device veth1_macvtap entered promiscuous mode [ 1151.986863][T14716] device macsec0 entered promiscuous mode [ 1152.295790][T14737] device wg2 left promiscuous mode [ 1153.033503][T14785] device pim6reg1 entered promiscuous mode [ 1153.827565][T14840] syz.0.12832[14840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1153.827652][T14840] syz.0.12832[14840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1153.841794][T14840] syz.0.12832[14840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1153.843112][T14836] device pim6reg1 entered promiscuous mode [ 1153.853456][T14840] syz.0.12832[14840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1154.211904][T14866] device pim6reg1 entered promiscuous mode [ 1156.204523][T14928] bridge0: port 1(bridge_slave_0) entered blocking state [ 1156.358100][T14928] bridge0: port 1(bridge_slave_0) entered disabled state [ 1156.420229][T14928] device bridge_slave_0 entered promiscuous mode [ 1156.498960][T14928] bridge0: port 2(bridge_slave_1) entered blocking state [ 1156.506012][T14928] bridge0: port 2(bridge_slave_1) entered disabled state [ 1156.732515][T14928] device bridge_slave_1 entered promiscuous mode [ 1157.177966][T14959] device veth1_macvtap left promiscuous mode [ 1157.184089][T14959] device macsec0 left promiscuous mode [ 1157.273482][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1157.302165][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1157.375190][T14960] device veth1_macvtap entered promiscuous mode [ 1157.386887][T14960] device macsec0 entered promiscuous mode [ 1157.445510][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1157.464234][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1157.476323][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 1157.483417][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1157.491201][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1157.499809][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1157.512234][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 1157.519306][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1157.539209][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1157.566430][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1157.575903][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1157.584215][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1157.592783][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1157.600814][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1157.609328][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1157.622215][T14928] device veth0_vlan entered promiscuous mode [ 1157.771035][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1157.784177][T14928] device veth1_macvtap entered promiscuous mode [ 1158.045176][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1158.067334][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1158.327725][T14995] device pim6reg1 entered promiscuous mode [ 1158.837732][ T7] device bridge_slave_1 left promiscuous mode [ 1158.854044][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1158.872378][ T7] device bridge_slave_0 left promiscuous mode [ 1158.923092][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1158.954592][ T7] device veth0_vlan left promiscuous mode [ 1159.468142][T15047] device sit0 left promiscuous mode [ 1162.228694][T15111] device veth1_macvtap left promiscuous mode [ 1162.269955][T15111] device macsec0 left promiscuous mode [ 1162.356344][T15113] device veth1_macvtap entered promiscuous mode [ 1162.487349][T15113] device macsec0 entered promiscuous mode [ 1163.142760][T15225] syz.8.12920[15225] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1163.142853][T15225] syz.8.12920[15225] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1163.648967][T15241] device pim6reg1 entered promiscuous mode [ 1164.998343][T15279] device syzkaller0 entered promiscuous mode [ 1166.677339][T15369] device bridge_slave_1 left promiscuous mode [ 1166.690239][T15369] bridge0: port 2(bridge_slave_1) entered disabled state [ 1166.719472][T15369] device bridge_slave_0 left promiscuous mode [ 1166.730204][T15369] bridge0: port 1(bridge_slave_0) entered disabled state [ 1167.015423][T15372] device syzkaller0 entered promiscuous mode [ 1167.552391][T15428] device wg2 left promiscuous mode [ 1167.626004][T15428] device wg2 entered promiscuous mode [ 1167.740394][T15428] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1167.771701][T15428] syzkaller0: linktype set to 804 [ 1168.707404][T15463] device wg2 entered promiscuous mode [ 1169.575404][T15502] device syzkaller0 entered promiscuous mode [ 1169.699585][T15513] device pim6reg1 entered promiscuous mode [ 1170.005855][T15537] device syzkaller0 entered promiscuous mode [ 1170.138503][T15548] syz.7.13011[15548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1170.138578][T15548] syz.7.13011[15548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1170.714489][T15552] device sit0 entered promiscuous mode [ 1172.143780][T15625] : renamed from veth0_vlan [ 1173.541481][T15740] device bridge_slave_1 left promiscuous mode [ 1173.553439][T15740] bridge0: port 2(bridge_slave_1) entered disabled state [ 1173.590643][T15740] device bridge_slave_0 left promiscuous mode [ 1173.597664][T15740] bridge0: port 1(bridge_slave_0) entered disabled state [ 1173.733612][T15768] bridge0: port 1(bridge_slave_0) entered disabled state [ 1173.773449][T15768] device pim6reg1 entered promiscuous mode [ 1175.045892][T15802] device pim6reg1 entered promiscuous mode [ 1176.335916][T15873] device pim6reg1 entered promiscuous mode [ 1176.712617][T15886] device pim6reg1 entered promiscuous mode [ 1176.795528][T15894] device pim6reg1 entered promiscuous mode [ 1176.866342][T15899] device syzkaller0 entered promiscuous mode [ 1178.289491][T16027] device pim6reg1 entered promiscuous mode [ 1179.220946][T16060] syz.9.13151[16060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1179.221008][T16060] syz.9.13151[16060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1179.301824][T16058] lo: mtu less than device minimum [ 1179.558421][T16070] device pim6reg1 entered promiscuous mode [ 1179.603678][T16070] bridge0: port 2(bridge_slave_1) entered disabled state [ 1179.730391][T16099] bridge0: port 2(bridge_slave_1) entered blocking state [ 1179.737597][T16099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1179.914523][T16099] device bridge0 entered promiscuous mode [ 1180.147959][T16109] device sit0 left promiscuous mode [ 1180.517414][T16118] device syzkaller0 entered promiscuous mode [ 1180.798557][T16143] device wg2 left promiscuous mode [ 1180.832425][T16150] device syzkaller0 entered promiscuous mode [ 1180.989260][T16154] syz.9.13177[16154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1180.989348][T16154] syz.9.13177[16154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1181.589826][T16164] device syzkaller0 entered promiscuous mode [ 1181.697196][T16192] device macsec0 left promiscuous mode [ 1181.751702][T16210] device sit0 left promiscuous mode SYZFAIL: repeatedly failed to execute the program proc=1 req=13219 state=1 status=7 (errno 9: Bad file descriptor) [ 1183.207814][ T24] audit: type=1400 audit(1756319107.919:177): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[13788]" dev="pipefs" ino=13788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 1184.457949][ T296] device bridge_slave_1 left promiscuous mode [ 1184.464065][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 1184.471495][ T296] device bridge_slave_0 left promiscuous mode [ 1184.477831][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 1184.485847][ T296] device bridge_slave_1 left promiscuous mode [ 1184.492122][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 1184.499465][ T296] device bridge_slave_0 left promiscuous mode [ 1184.505552][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 1184.514428][ T296] device veth1_macvtap left promiscuous mode [ 1184.520485][ T296] device veth0_vlan left promiscuous mode [ 1184.526275][ T296] device veth1_macvtap left promiscuous mode [ 1184.532499][ T296] device veth1_macvtap left promiscuous mode [ 1184.538784][ T296] device veth0_vlan left promiscuous mode