last executing test programs: 1m42.162179783s ago: executing program 2 (id=5603): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000500)='fib_table_lookup\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x40000009, 0x0, r2}, 0x48) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x3, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x7ff}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000007290000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) socketpair(0x2, 0x3, 0x1, &(0x7f0000000300)) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000cf0b30e7532955427c32eaae6c501bf74523b37f878917fc1feeffde640f0e3af4f94cfdcfedea1a00cc26dc0dfe3d8d388f5cd8495dfb1ad0bd5b1f5766370a697a6ec7628b3fdbbb5b7dcc67092d6671dfd39c7c79168773a7579b6755247c62c62045d829af5105a22ff57159ec12", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x18, 0xa, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)) 1m41.957902295s ago: executing program 2 (id=5606): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080", @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000400121001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000002000083850000007100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x600, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)=@generic={&(0x7f0000000380)='./file0\x00', r2}, 0x18) 1m41.900203096s ago: executing program 2 (id=5608): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r2, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x2d, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}], 0x30, 0xffffff63, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x52, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x20, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000006000000000000000900000000110000e53fe27377cd364088fe5e2e477389d3795d7283dac1f8bbb2b9bc77f741485bc31f9e9611cf7b000000115ab181572818946167a5c7804aad403f75ff86a2268c424466028e258e9e5b0b00cf087bf3e93c967a67d78ae8272e9dca3108c42b48385fb1bdc09c9c32ff94987c27b2788fe366d0e5193c620b84e11db3a2c97ee49e05bcc83bcd4628110b700be1597094ae2bc86ee5bca95b60bbabb83a4c6b4422ab21e49d7e7fa062947f3f7c94f79daf73fedc67ffb5c184cc7359f974b39c", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7080000000000007b8af8ff00000000b7080000070000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000003520600f8ffffff8520000001000000184b0000ffffffff0000000000000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0xcff4, 0x1000, &(0x7f0000001340)=""/4096, 0x40f00, 0x0, '\x00', r3, 0x18, r2, 0x8, &(0x7f0000000a40)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000a80)={0x1, 0xe, 0x2, 0xbac}, 0x10, 0x3bad, r2, 0x1, &(0x7f0000000ac0)=[r1, r1, r1, 0x1, r0, r0], &(0x7f0000000b00)=[{0x1, 0x2, 0x7, 0x4}], 0x10, 0xc}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05005bf080030000000000000000000800000005", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e00)={@cgroup, 0x35, 0x1, 0x9, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000580)=[0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xe, 0x5, 0xa, &(0x7f0000000500)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) 1m41.298839575s ago: executing program 2 (id=5620): bpf$MAP_CREATE(0x300000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYBLOB, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0xe, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x8200, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@base={0x1b, 0x0, 0xaa, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0xc, &(0x7f0000001200)=ANY=[], 0x0, 0x6, 0x0, 0x0, 0x0, 0x5d, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8982, &(0x7f0000000080)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000001ec0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018010000646c6c2500000000002007007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0)=r7, 0x4) sendmsg$inet(r5, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 1m41.156237658s ago: executing program 2 (id=5622): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d00000085"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e00000085"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000c200"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xf, r3, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000079122800000000009500000000004000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) r6 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x2b, 0x2, 0xc, &(0x7f00000002c0)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x10, 0x0, 0xa, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x0, 0x0, &(0x7f00000004c0)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780), &(0x7f00000007c0)=[{0x2, 0x2, 0x3, 0x5}, {0x3, 0x3, 0xb, 0x3}, {0x4, 0x5, 0x10, 0x6}, {0x2, 0x4, 0x3, 0xb}, {0x4, 0x5, 0x2, 0x1}], 0x10, 0xb}, 0x94) 1m41.090591959s ago: executing program 2 (id=5624): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffff3be}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000740), 0x80000002, r0}, 0x38) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0xf1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_wait_time\x00', 0x7a05, 0x1700) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r3, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0xe6, &(0x7f0000000400), 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xe8, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) bpf$LINK_DETACH(0x22, &(0x7f0000000bc0), 0x4) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f0000000a80)='./file0\x00', 0x5) bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r8}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r8, 0x58, &(0x7f00000003c0)}, 0x10) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0200000004000013c1b5408fa3272f9ceac5377000080000596cce0c38746684982b57fb3211a1d3a1f905dea98f467f3bca2626e1f60da6d6c9501c0c78275d59eb2f0ae84c0000000000000000488883ec4c0d1dc8be90d547552215685919f28f1697c2525dddaeb5e381e2881ad9d69320a45820c9f171936fe9dd92d003c982e4be892fd0317eb58a20edd7b2e4f02cb44cc287ff31008e25c9bb9bf6eb9fcfe72d9d66b8c46eba69bb9307657064e641b3fe7cbf4d01c8c8eeef29e3d59f22d612b10430", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000000)={0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x6, r9}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r8, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0xc3, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000480), &(0x7f00000008c0), 0x8, 0xcf, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) 1m25.989747242s ago: executing program 32 (id=5624): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffff3be}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000740), 0x80000002, r0}, 0x38) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0xf1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_wait_time\x00', 0x7a05, 0x1700) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r3, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0xe6, &(0x7f0000000400), 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xe8, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) bpf$LINK_DETACH(0x22, &(0x7f0000000bc0), 0x4) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f0000000a80)='./file0\x00', 0x5) bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r8}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r8, 0x58, &(0x7f00000003c0)}, 0x10) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0200000004000013c1b5408fa3272f9ceac5377000080000596cce0c38746684982b57fb3211a1d3a1f905dea98f467f3bca2626e1f60da6d6c9501c0c78275d59eb2f0ae84c0000000000000000488883ec4c0d1dc8be90d547552215685919f28f1697c2525dddaeb5e381e2881ad9d69320a45820c9f171936fe9dd92d003c982e4be892fd0317eb58a20edd7b2e4f02cb44cc287ff31008e25c9bb9bf6eb9fcfe72d9d66b8c46eba69bb9307657064e641b3fe7cbf4d01c8c8eeef29e3d59f22d612b10430", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000000)={0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x6, r9}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r8, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0xc3, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000480), &(0x7f00000008c0), 0x8, 0xcf, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) 4.356940253s ago: executing program 1 (id=6936): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) close(r1) 4.260326425s ago: executing program 1 (id=6938): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x11, 0x0, &(0x7f00000004c0)="114f5a74e98d438c84cbc1a6b3cbfd71c9", 0x0, 0x6, 0x0, 0x8}, 0x50) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x1e, 0xa, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYRES16=r1, @ANYRESOCT=r0, @ANYBLOB="87613a8ac0d0fc3b12061ed738f2a2207b64137d977ffbbf386baa0afe9346187c9869a9c249aa7865267dd4d81d1fdab44d08d0547a35c862a961fcabca22d1a8961e3762ab4927c87052a09fb64b7417852b213685cc5a320beba4add3bd8846612490717b8ba676abf78baa5c6b3339e2b5bcf0272ff4c5cb4188ebbf18b6092aff22bbbdc9a7ab77c32633227a212ca6254bd157584737e9316215520bdeaeebc8a6d66eb9d420ec806b796591c6e8328776d2f4b38e6374547069687a5cb61aa7be85fe4654fda2a31b81142821af45be1e427f16ff7039bba2c2655e995af4acd1847eaea67d435a79217228ad8d446cc015c6"], &(0x7f0000000000)='GPL\x00', 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x47}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000, 0x2}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) gettid() socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r3) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0a00000004000000080000000b"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xd, &(0x7f00000004c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) openat$cgroup_ro(r4, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) sendmsg$unix(r1, 0x0, 0x800) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b0000000000000000000000008000", @ANYRES32, @ANYBLOB="00000000d3ec66ecc053c543da2e2e", @ANYRES32], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018e206eca728b1538327cf7d5db557641100008ca7ed88f56000000000000000b2bc33055bbf1c", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x46, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0500000004000000ff0f0000050000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES16=r6, @ANYBLOB='\x00'/25, @ANYRES8], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="18a200000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0xb, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.308758119s ago: executing program 5 (id=6942): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.306271609s ago: executing program 5 (id=6943): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff2f, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000280)="b46180e4f614681b3f16d1fa7edfe68a331d206eed4f2c99c5ae410e1116da51831bdf38197476a7008c8c5f57c441e7bba1fa850bbb8b236f05eac68c0560dd80f770f8dd2284b1ddb196daf5d3b8b9a194d7dacc139e7f7208b65dff8dd5a29909a2e9fa06cc6a14d407aa3f52a646a8be7e27f9898c652b7e9eeb49ae446d06bfc9f1822e5adca6", &(0x7f0000000040)=""/122}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="1802000040000000000000000000000085000000410000008500000007000000950000000000000006ca70bd00a0d9e7d8942f1f94e7c9116d5a0f482116df2d663aec14135d8e4d2343c0923bd5de630d32236195e72e40d7928b7e72e1b33c3e1480fcf19470787a4c1dd8f0c59f44e40ca30383c6c7afc8d7e7c3a5ff5a20252ffbf3e03624ea7fbf7e15e4bbb16c2196acc407c53138b6453618c985080a24f747e7f7078fa6a19d5e533c151ef4c43a7be47dd13c7e8e3fb20c90e35890c1668dcd02481729c5400d244c914c96470816903b637f3863ae9be769de1bec064d14238a557b068b6e3835fd7a552ba97a68eaba7e1bf7c8050b010186725419bfab25980fd28971b51bee4ebd93ff5ce25216feffb999213aa6efa332c24ccfc35e69c9847c7bd1927ea75535799930a909a0378405f6e65a2386d3827b05793b9dfa745b0fe6b15866a89b96645dac8404e51258b2fe718fe817f44f8889d6432986d23cd6e0967ce24209ed1a52c135db8d881fe1f09e78740b41051e34e903be74caa51a7d7e683a"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) 3.25611876s ago: executing program 5 (id=6944): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x7, &(0x7f0000000040)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x29}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbb5, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000001c0)='syzkaller\x00', 0xffffffff, 0xcc, &(0x7f0000000300)=""/204, 0x41000, 0x19, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x4, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000240)=[0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000400)=[{0x0, 0x1, 0xf, 0x7}, {0x2, 0x4, 0xe, 0x4}], 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000000)='afs_lookup\x00', r0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000540), 0x6e, &(0x7f0000000c80)=[{&(0x7f00000005c0)=""/120, 0x78}, {&(0x7f0000000640)=""/13, 0xd}, {&(0x7f00000007c0)=""/217, 0xd9}, {&(0x7f00000008c0)=""/234, 0xea}, {&(0x7f00000009c0)=""/191, 0xbf}, {&(0x7f0000000a80)=""/202, 0xca}, {&(0x7f0000000b80)=""/241, 0xf1}], 0x7, &(0x7f0000000d00)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}, 0x21) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x82000000, 0x4}, 0x0, 0xc491, 0x0, 0x0, 0x7, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x7, &(0x7f0000000040)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x29}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbb5, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000001c0)='syzkaller\x00', 0xffffffff, 0xcc, &(0x7f0000000300)=""/204, 0x41000, 0x19, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x4, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000240)=[0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000400)=[{0x0, 0x1, 0xf, 0x7}, {0x2, 0x4, 0xe, 0x4}], 0x10, 0x7}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000000)='afs_lookup\x00', r0}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000540), 0x6e, &(0x7f0000000c80)=[{&(0x7f00000005c0)=""/120, 0x78}, {&(0x7f0000000640)=""/13, 0xd}, {&(0x7f00000007c0)=""/217, 0xd9}, {&(0x7f00000008c0)=""/234, 0xea}, {&(0x7f00000009c0)=""/191, 0xbf}, {&(0x7f0000000a80)=""/202, 0xca}, {&(0x7f0000000b80)=""/241, 0xf1}], 0x7, &(0x7f0000000d00)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}, 0x21) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x82000000, 0x4}, 0x0, 0xc491, 0x0, 0x0, 0x7, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) (async) 3.214980411s ago: executing program 1 (id=6945): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100003020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000f8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0xc000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000440), 0x5}}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x2, @perf_config_ext={0x3, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r3) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="628a1bf1e9fe3f69080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/17, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x50, &(0x7f0000000080), 0x0, 0x10, &(0x7f0000000580), &(0x7f00000004c0), 0x0, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001000)="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", 0x2d5}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) sendmsg$tipc(r6, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000640)={'dummy0\x00', @local}) sendmsg$tipc(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595350b4fb90ff598"], 0x0, 0x4a}, 0x20) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f0000000cc0)=ANY=[], &(0x7f0000001480)=""/167, 0x77, 0xa7}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78fbaa0d00000000000000972e8fc86808570e56f601fee668"], 0x50) 3.159299372s ago: executing program 5 (id=6948): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 3.058638453s ago: executing program 5 (id=6949): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'sit0\x00', @local}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000073011500000000009500000000000000f96754a655718b389b9c5c8e81e1c3df94751ad2ee857dae40e64c901f88df739e2381b48200e3cfc55eccf7987a40da24f0b000eabd146a7478351bba67be8b1ccf40e3c8f5a5af7a5084cd2a1305d7e4560ea2cd9d0fd5add1f1725f227c1445ad057bf345935ca36967d0f147424a14a91cdca1cee5b58cae675f28e27cdacc50cd03d25fdc1a0a4823abca26408544ec03d8556e4f55f86af12a7ac8d564a86a3cee099ec2d0fb351a"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x20, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000540)={&(0x7f0000000200)=@id, 0x10, 0x0}, 0x4000041) r4 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000340), 0x9) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x43}]}}, 0x0, 0x26}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f00000006c0)={&(0x7f0000000240)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000005c0)=[{&(0x7f00000022c0)="0079e120b56e53235134e628dcaed8c4a3b323a2cf4c5baa19410960c399a49395ed063b5b090066cfaabc0d41af86d29b52303762f0ce8f37ed209c6cb2470351a035b105da90c2f088b51078369b21bb71277e1c34157ee4a80fc659c96924df8636d912aeefe1acc7ce90448be843c558850a5bfa382b944a7f465ffa6ffb26541c5449dd20ef27ab8042ba737f1e0319662ee84ba367e7b9cb1fff9a321ebcb508b6432732cfa993bb9c3bc22a63c980a64089db1f4018e081654ccc3a681a48b361a0d5a2d36e1ace4377d6ab839b895ee1860547a803b4811bf55ce04ebc620402a16bda1429f800f0a751a26f295126767122e9757345f605ba37d3ebfe706ae5a2ecd347e4140e5eef4b6c654fed272c8503b7ef14bdfd9a3a48c5d396f9339bd35207277c186dda241a0fce425f1f129ad46dd405c9879daf0266269c41e198a193b3df808602881c986d32db415663f11fb5585e5ae4411ca220628fe97392e0b54f8aa638c112cbb8f8020253692228de00e7176086b10eb8ee0fd7c5fc40a1c5e8d18b9e2e596a4b1a5859360afb4acd9d8af0fcb025c3d3f694b9d63795f22129e6e54037dfaa197fe9022d0c8ce8e7e7ad615b64dc8317caa8ffceeb7addfadb287dc050564ca0f02fbbfe2cbd6bd7b1307f7ebae09a4a5862a507120c490eaa8a0b78c4416d75563a31ef6653068d749f7515b2f9823a01e1b4dc680ba762c807130472aa16df1479fb07d84226771ec555b7bc461cb563957970d413dccc1deee82f67b272ebe3ab518a8d09195a608c4cf77780183c817aaea86f995fc2d4021a0a838664bea63447f7d14b24c094d8a1f937668057036dabbc610cd24542068c4483c0eff466c316b38b43de3c6069ccb09984ab6f4b8eef088ec42b2844d092d36dc760948a896107fc5e3170541fbeab3b9a0bb24e6cf88fe810d6db8f8d12a50c285b5ff5b205e15454c9089f0d8ff40691a9133d5e7039061f3bd7c993742feca8676b5b8f0184d8477415257073fc07af51bc9b1684d853769b8cc7d9db00c074531a695b7b0b35fb58ec769143d698c3db9f9312f039a6a97b395c1e3330b2edbbac9dca625b1cf1e7c7a2e1e8946abf7751472fc2ae687817c84b8de024fa341dc838ff1fd8515a19237421a2694a5d0f52399f0e558c2f74f46f89844de71ed2bbabaaccd41ee1bb49384848110f3ebd38aaa4a4b2dd7338f70879edb05726b1edbc535ad3e8e6108a3457c48adebe09b4c8fcbd494e5f95e663dc82398abd9fbb3d8eed0f1b289899fd4a9a19711dc9c7bb26ca43a09ef2e54fd5a6c033583379e42aad4ff3da2f8b33ede8f6e729ca7bc2849c79743509199346465006d149a11640b2d95b2efe3cbfe0f3fbe1fa61557a3254fdc57a0c5de6b00fa15671fb6b15f54d8fd49e433816b8d58b2584474aae2332b3a1271c81d35bd17ab642dc5a889640fdc68e9162e6bd7a970c350585549d994dd6f9ecc2ef20a138eab6606881032eee6cd34fc9f9cb0b9a04957f762add0631e59b69c3ad7f9967aab7d2658d6b8f74a992bce994e49f36466959d39c608634e0c54384504b4dbbbc261ed2b2a6ab7cf403ea56bd5e30aaf674db158336c32fe6c4b32d781c862b3c51a9ec601a874b5268baf573b0d3f9b9a3fa2036ec365da87aeb6d9c18541e9fd6dc70fb021e9b8ec45f87bdf1cedd27b4af36e690e60e5cc51f7292c0326cb7d71d303fd83727bc537169825ff6dfd5b240952f0649419e8757420d51b461c2428febdedb39515cf7ea617da55c4a3c622349d70d85369faa79d3c6285de2b480e33cfdb40487086b30bb8f6250d80b60561ab9f8cf471d02665af65bed664073a06015562171954b0e1133621ca8e73b73fc7f05db8165085f17a2d5cbcc0f58afe8d1a6e93c2c3d88e054f056312a855666787ea4351e25cc1807c81452240116f69effbba226c78ce66538dfb77a34786501745514f40ccc36e49e822bde143c1415a20f158a00e8284e1a85d1884ca3e38c6f70147ac75d297ff7fdbb188c5ea5cb02c0553e63c323b6e42a645c5d0e86159fb4fc0fc7bc6800aba12604d8a26c894163cff56c4f53ca574a112ac08ce62dfc2186875139d5460498819d746d7e241d15646a3720548da86b257f8c094a12a91fd9f04fdc3a37246690a26fdb0873845d7810cf36adc1ae1f450b7efca5c1992d78bc1184c301d5b357aa55016d5b6bd22a761b3e263ae956cf61a1c81b926954e7eca2a8f5c24204731ae2a688f2cc94af1fa84176cf7761f15057a35e0b04598a6348bf5b3b266b0c7406e0dffcb97b6bc4af88b2d6816021872a876b93374d929c128a7c060771c96eda9cf9693063c2e744d5c501ef3887c05d8a67f21bd4f4b0f4c395a7e88130885bb1314e1ce319a736b0f20e1f2e4325715ffb065137a11b82e7146e049fe68b7a2fc02cc01ca900f91e79c73155989be0ee25a34d704a94a999c76f51838762d4adec00b44874ef4147ad851afe52259795a46a5a7abedf55a5bc6de1c60bfb5bfd054d3144ae9d4fd6992c05028d4452a6c1995a93ba3e2f42c86df31ad61c29ae3c7df9c1e9cb2e7b0723f8b58809eaea3174a4ac70b1ce5e4c77ee4a1911f18ca7f7ccbbb0ded703269a1f8c41d53e2c7e9677033359987b079f2d5915713493a113108b62f594044ebe8cfe776ccb219ad8cb00996e2b097e0dc4e8a094288a9dc1b5a9e2ddab24bddf23b05905e1d71bfe44b1c8ca475c779accbc48e070455c0ddb57013238d41786fe1aacb6dec129b0f352013f734fb7ba237153453c68fefbc2f45e68a8684c4d4ebb191a03e0313582d411b5cc2f02174a5c33acd8f403c7b262fb4a7cd1e8e2f5220cd306b73a5b71", 0x800}, {&(0x7f0000000480)="98394755849309c480bfe4d40fdf45226dd7e2c5bc8d33c4c6544b7e033b9362065e0d967c99e7b40911fd8c2363ce70339f149b9536076be177b5605f3c30f4b483eaf594719aea8e9669235978c074000b221c10e9d7d87f3b95fc0592aeac9b62aff9161b528f7d976f542c03f40b3a0e499696b37dbab00c17a264d4587abe7c9922442d9c4a503676ef93c5492ad6aae064f97e62d77b36b6ef0ef942d6adb1765230c1b49b39b2bf0c890d3720958b05b44ea6bec04aa37a998aae00c798aeb617343cc59f5e91e0d1", 0xcc}, {&(0x7f0000000400)="b3d6559e56f50325c4611062a5c3cb8e790f756ecd08f649c9dd362b37d358d9903a1127b0ad0ffae3e4c85e22c8d9c129a5e6c1df138663a0aed9b245e81dce08e8b9210912b34361e1", 0x4a}, {&(0x7f0000000700)="d67154b3319046c876543a1821d18d5499df58e42924f4a7a3a13c275e5073130b8dd5b3b61f85ce6d920207894e3855eab7615de69ff1ef72930bd952cb20c3b519f9fec024", 0x46}, {&(0x7f0000000780)="fc9500b122857b2594df250bd9faed30f25d734d38d53f3065d30241e9421ea7557310d2e074f7f06cc4369ef00d2b646eb104f10884d0ceb9bffc114ae6bfceb042ad3c6d033b70fb86d8097beb4243338bb795ab6c25596ed9cac943a276e1c1729ddf3e1c1a4c021873bfec72def061", 0x71}, {&(0x7f00000032c0)="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", 0x1000}], 0x6, &(0x7f0000000640)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x18}, 0x40) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) syz_clone(0x80000000, &(0x7f0000000800)="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", 0xfe, &(0x7f00000002c0), &(0x7f0000000580), &(0x7f0000000900)="9dd1c805f00d6adbe1fb51b3a9e71582df1e9a27e27e0172ef13878a3679ec6438cd733934faec0efb3d964dc23369e057e441a0077a83226fbb3a0dcbb890882d0a33d36e439d90428f3234ccd929d2e9ec2f75") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 2.952274755s ago: executing program 1 (id=6950): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r1}, 0x8) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x5, &(0x7f0000000300)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000d5030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r9}, 0x10) close(r8) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) close(r10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8f03000000000060007538e486dd"], 0xcfa4) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x66) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'wlan0\x00', @local}) ioctl$SIOCSIFHWADDR(r11, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x35}}) 1.92570293s ago: executing program 0 (id=6954): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0xff}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x9b47, 0x30100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x7}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.763743083s ago: executing program 5 (id=6955): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffc}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000"], 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@name={0x1e, 0x2, 0x1, {{0x0, 0x4}, 0x4}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000780)="a2125c795dcadd829edbe3b0a04156fa93d7a983d9df3c23895d176415ef2908501b083d8148a6c42a38174bba2034c6eef00aaaee278965f383d12d389d53024c57fa61871c4921f136e777b970a1dbcfff81e248d3b9fdcaf780cd55f663e6dd038977f066550dc35e30a271b0263cfc4888b5c13dfad57213bcc2f82ea7b97a353ea38f01d29266e5d633e0357e357fbc1994577a44596270f1c6d9d971640716e0659a7b6d3ffbce2fae7f5e576290982f", 0xb3}, {&(0x7f00000002c0)="a746ff0e2f32d60bee1d4068cf95c205b5a02a43f6ae3028ee7f692d450ca1f26858a91a92d78cff4139cce36443036683bfb284ec78c5074a235a1d5e4707f594c01b0d167ecaece173e00bc1db57ba395c2e1e74b684a4290c83b209338d7cc16f25e3a1933dec7a979a44", 0x6c}, {&(0x7f0000000840)="135a417a68e9a3f6447872ad05d2235afc534918afa5c1fa966d3ecba9888ce04423b5370d15f8157f4aaa6b61a4ef23cb5fae99986943130f00b3f3184b76da462d5b6fad1bb3ece8a879ff86cffaa6558822393af13c6e0fc50f1aee02d1038c4cb804456016713d9d06a00c526bdd0e9d5933e5dcffdee7", 0x79}], 0x3, &(0x7f00000008c0)="f7a24065ef1d9190ca65b122fcdfd0fa6a8a0b9cdf05d838d86bc4e45601891bec1596efef2820be268daca38757086ef4df172aad1167837a64041f67ee6dae9c41ddcd147a65e822e3e3985ecf8b49aa0da856fad6e9fd103ef085759179c0c9a249f2af5b16d020bec57e011bb0eaad529c1c01494275c6e0b8fa86f4eefff67517c9c32a2a8e8dd728b49648fb88772e57e7032cbdd2547b444389a9d5f16412e38537006a6161d890f4429672ffb94002abd3a8c7f6f67e", 0xba, 0x4000}, 0x4000081) (async) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280)=@name={0x1e, 0x2, 0x1, {{0x0, 0x4}, 0x4}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000780)="a2125c795dcadd829edbe3b0a04156fa93d7a983d9df3c23895d176415ef2908501b083d8148a6c42a38174bba2034c6eef00aaaee278965f383d12d389d53024c57fa61871c4921f136e777b970a1dbcfff81e248d3b9fdcaf780cd55f663e6dd038977f066550dc35e30a271b0263cfc4888b5c13dfad57213bcc2f82ea7b97a353ea38f01d29266e5d633e0357e357fbc1994577a44596270f1c6d9d971640716e0659a7b6d3ffbce2fae7f5e576290982f", 0xb3}, {&(0x7f00000002c0)="a746ff0e2f32d60bee1d4068cf95c205b5a02a43f6ae3028ee7f692d450ca1f26858a91a92d78cff4139cce36443036683bfb284ec78c5074a235a1d5e4707f594c01b0d167ecaece173e00bc1db57ba395c2e1e74b684a4290c83b209338d7cc16f25e3a1933dec7a979a44", 0x6c}, {&(0x7f0000000840)="135a417a68e9a3f6447872ad05d2235afc534918afa5c1fa966d3ecba9888ce04423b5370d15f8157f4aaa6b61a4ef23cb5fae99986943130f00b3f3184b76da462d5b6fad1bb3ece8a879ff86cffaa6558822393af13c6e0fc50f1aee02d1038c4cb804456016713d9d06a00c526bdd0e9d5933e5dcffdee7", 0x79}], 0x3, &(0x7f00000008c0)="f7a24065ef1d9190ca65b122fcdfd0fa6a8a0b9cdf05d838d86bc4e45601891bec1596efef2820be268daca38757086ef4df172aad1167837a64041f67ee6dae9c41ddcd147a65e822e3e3985ecf8b49aa0da856fad6e9fd103ef085759179c0c9a249f2af5b16d020bec57e011bb0eaad529c1c01494275c6e0b8fa86f4eefff67517c9c32a2a8e8dd728b49648fb88772e57e7032cbdd2547b444389a9d5f16412e38537006a6161d890f4429672ffb94002abd3a8c7f6f67e", 0xba, 0x4000}, 0x4000081) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) (async) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, 0x0, 0x0) close(r6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r9}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) (async) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x0, &(0x7f00000002c0), 0x0, 0x7, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f0000000340)={0xa, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000400)=[r1], &(0x7f00000004c0)=[{0x3, 0x5, 0xe, 0xa}], 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.700301794s ago: executing program 1 (id=6956): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r0, &(0x7f0000001b80), 0x0}, 0x20) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000880), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x22, 0x0, &(0x7f0000000140)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r5 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r4}, 0x8) close(r5) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r5, r4, 0x4, r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000040)=r5, 0x4) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 1.678397114s ago: executing program 1 (id=6958): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x8080, 0x2, 0x0, 0x1, 0x7fffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x2}, 0x842a, 0x200000000000000, 0x7, 0x5, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r2, &(0x7f0000001b80), 0x0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000880), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0x22, 0x0, &(0x7f0000000140)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000000000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r7 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r6}, 0x8) close(r7) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r7, r6, 0x4, r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.669670065s ago: executing program 3 (id=6960): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r5], 0x18}, 0x0) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRESDEC=r1], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) close(r6) 1.526313647s ago: executing program 3 (id=6962): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB='+cpu G'], 0x5) write$cgroup_subtree(r3, &(0x7f0000000500)=ANY=[@ANYBLOB='-cpu'], 0x5) r4 = openat$cgroup_type(r0, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x9) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@generic={0x84, 0xf, 0x9, 0x5, 0x8}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) 1.463840948s ago: executing program 0 (id=6963): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x2b, 'net_prio'}, {0x2d, 'cpu'}, {0x2b, 'net_cls'}, {0x2b, 'blkio'}, {0x2b, 'memory'}, {0x2b, 'rlimit'}]}, 0x2f) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x3, 0x3, 0x6, 0x0, 0x1, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x1, 0xffffffff}, 0x4029, 0x8, 0x2, 0x0, 0xb6a7, 0x5, 0xfff, 0x0, 0x7fffffff, 0x0, 0x81}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000140)='syz1\x00', 0x1ff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) openat$cgroup_type(r1, &(0x7f0000000200), 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/178, 0xb2}], 0x1, &(0x7f00000003c0)=""/4096, 0x1000}, 0x120) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000001400)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001440)=r2, 0x4) close(r0) r5 = openat$cgroup_ro(r1, &(0x7f0000001480)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001680)={r5, 0x20, &(0x7f0000001640)={&(0x7f00000014c0)=""/243, 0xf3, 0x0, &(0x7f00000015c0)=""/93, 0x5d}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000016c0)=r6, 0x4) r7 = openat$cgroup_subtree(r5, &(0x7f0000001700), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000001740)={[{0x2b, 'hugetlb'}, {0x2d, 'hugetlb'}, {0x2d, 'rdma'}, {0x2d, 'cpuset'}, {0x2d, 'rlimit'}, {0x2b, 'devices'}]}, 0x31) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c80)={r5, 0xe0, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001980)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f00000019c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001a00)=[0x0, 0x0], 0x0, 0xb2, &(0x7f0000001a40)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000001ac0), &(0x7f0000001b00), 0x8, 0xa, 0x8, 0x8, &(0x7f0000001b40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001d40)={0x5, 0x21, &(0x7f0000001780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffff3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ldst={0x3, 0x3, 0x1, 0x1, 0x4, 0xa8d005d24065af6, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000018c0)='syzkaller\x00', 0x0, 0x6f, &(0x7f0000001900)=""/111, 0x41100, 0x0, '\x00', r9, @fallback=0x2b, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001cc0)={0x5, 0x3, 0x6, 0x7}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000001d00)=[r2, r5, 0x1], 0x0, 0x10, 0x8}, 0x94) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001e40)=@generic={&(0x7f0000001e00)='./file0\x00', 0x0, 0x18}, 0x18) socketpair(0x2b, 0x2, 0xfffffff7, &(0x7f0000001e80)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001fc0)={@map=r3, 0x2f, 0x0, 0x10, &(0x7f0000001ec0)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000001f00)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001f40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001f80)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002000)={@ifindex=r9, 0xffffffffffffffff, 0x6, 0x20, r10, @void, @void, @void, @value=r8, r12}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000002280)={0x1b, 0x10, &(0x7f0000002040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff}, [@call={0x85, 0x0, 0x0, 0x8c}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x7, 0x0, 0xa, 0x1, 0x9, 0xffffffffffffffc0}, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f00000020c0)='GPL\x00', 0xffff, 0x2c, &(0x7f0000002100)=""/44, 0x41100, 0x2, '\x00', r9, @fallback=0x18, r2, 0x8, &(0x7f0000002140)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000002180)={0x4, 0x9, 0x2, 0x4}, 0x10, r6, 0xffffffffffffffff, 0x8, &(0x7f00000021c0)=[r5, r5], &(0x7f0000002200)=[{0x1, 0x2, 0x9, 0x3}, {0x1, 0x2, 0x4, 0x2}, {0x4, 0x1, 0x1, 0x7}, {0x4, 0x4, 0x6, 0x8}, {0x5, 0x3, 0x4, 0x5}, {0x1, 0x2, 0x7, 0x1}, {0x0, 0x2, 0xc}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002380)={0x1b, 0x0, 0x0, 0x7ff, 0x0, r11, 0x5, '\x00', r9, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002500)={r13, &(0x7f0000002400), &(0x7f0000002440)=""/189}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002640)={@cgroup, 0x14, 0x0, 0x3, &(0x7f0000002540)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000002580)=[0x0, 0x0], &(0x7f00000025c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 1.410501749s ago: executing program 3 (id=6964): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000400)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0, 0x65, &(0x7f0000000500)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x8b, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@restrict={0xe, 0x0, 0x0, 0xb, 0x2}, @restrict={0xd, 0x0, 0x0, 0xb, 0x1}, @typedef={0xd, 0x0, 0x0, 0x8, 0x5}, @type_tag={0xd, 0x0, 0x0, 0x12, 0x5}]}, {0x0, [0x5f, 0x0]}}, &(0x7f0000000880)=""/29, 0x4c, 0x1d, 0x0, 0x7}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x96, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00)=r6, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_lsm={0x1d, 0x28, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x2}, @jmp={0x5, 0x1, 0xc, 0x2, 0x7, 0x7fffffffffffff78}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @ldst={0x0, 0x1, 0x4, 0x1, 0x1, 0x6}]}, &(0x7f0000000300)='syzkaller\x00', 0x3, 0x5d, &(0x7f0000000340)=""/93, 0x40f00, 0x4, '\x00', r4, 0x1b, r5, 0x8, &(0x7f0000000900)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x1, 0xc, 0x6, 0x4}, 0x10, r6, 0x0, 0x3, &(0x7f0000000980)=[r1, r1, r1, r1, r0], &(0x7f00000009c0)=[{0x1, 0x3, 0x10, 0x9}, {0x5, 0x4, 0x8}, {0x5, 0x4, 0x2, 0xc}], 0x10, 0x9877}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3f, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x50a3}}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r7}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.374187669s ago: executing program 0 (id=6966): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3ff, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg(0xffffffffffffffff, 0x0, 0x1f00) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454c9, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0x1, 0x12) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r4, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000500)=[0x0], 0x0, 0x29, &(0x7f0000000580)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x59, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x3, 0x4, 0x4230, r3, 0xffffff7b, '\x00', r5, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x7}, 0x50) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x1b, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfff}, [@exit, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @func={0x85, 0x0, 0x1, 0x0, 0xd1}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffff9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x69}, @generic={0x7, 0x6, 0xc, 0xfff9, 0x40}]}, &(0x7f0000000200)='syzkaller\x00', 0x79, 0xe7, &(0x7f00000003c0)=""/231, 0x41100, 0x0, '\x00', r5, 0x0, r6, 0x8, &(0x7f00000002c0)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x1, 0x40, 0xffffffff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000500), &(0x7f0000000580)=[{0x5, 0x5, 0x2, 0x8}], 0x10, 0xb}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x0, 0x1}, 0x18208, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xf, 0x3}, 0x842a, 0x200000000000000, 0x7, 0x5, 0x0, 0x1ffffd, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x3) 1.229063942s ago: executing program 3 (id=6967): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000030000000600000000000000", @ANYRES32], 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x3, 0xc, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7b}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000340)='GPL\x00'}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a0", 0x0}, 0x31) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3}}, @func_proto]}}, &(0x7f00000005c0)=""/240, 0x4a, 0xf0, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000040), &(0x7f00000001c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0xfffffffffffffdf6, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @sk_msg}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1a, 0x800, 0x1, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x4, 0x0, 0x100c, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 1.085135944s ago: executing program 4 (id=6969): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x5, 0x9fd, 0x85, 0x41}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'pids'}]}, 0x6) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}, {0x2b, 'cpu'}]}, 0xb) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000020000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0xdd, 0xa}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1}, @ldst={0x3, 0x0, 0x3, 0xa, 0x0, 0xffffffffffffffe0}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0xc4, &(0x7f00000002c0)=""/196}, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r5, 0x0, 0x0}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000640)=ANY=[@ANYRESDEC=r7], &(0x7f0000000580)=""/154, 0x50, 0x9a, 0x4}, 0x28) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r9, 0x4004743d, 0x110e22fff6) 1.007742765s ago: executing program 3 (id=6970): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000040000000000000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x8, 0x1, 0x0, 0x0, 0x4, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)=""/193, 0xc1}], 0x1, &(0x7f00000003c0)=""/244, 0xf4}, 0x2000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x0, 0x7, 0x5, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) 966.499046ms ago: executing program 0 (id=6971): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x400000000000}, 0x0, 0x4, 0x0, 0x0, 0x504, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (rerun: 64) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110c230000) (async) ioctl$TUNSETOFFLOAD(r4, 0x40047451, 0xf0ff1f00000000) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) (rerun: 32) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 955.867386ms ago: executing program 4 (id=6972): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffff}, 0x1f8c8, 0xc8, 0x0, 0x3, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0xffffffffffffffff, 0x101, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='mm_page_alloc\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001340), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000340)=ANY=[@ANYRES8=r3], 0xfdef) write$cgroup_subtree(r6, &(0x7f0000000080)={[{0x0, 'memory'}]}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000000000100000000de05348b8b2d98f89359fde6ebeff09d266cc8539b73f691c9ece6e0e031ec69a926c9e03be44ead20626a793d9fcf13083740da", @ANYRES32, @ANYBLOB="feffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000500"/28], 0x48) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000018232c685dc2c969b297259dff0315f56c4cda3421b4571b00"/40], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x18) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r9}, 0x10) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) 815.183188ms ago: executing program 0 (id=6973): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, 0x0, 0xfdef) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000300)=0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(r1, &(0x7f0000000380)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\t\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x44) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xd, 0x3, &(0x7f0000000000)=@framed={{0x72, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xaf}}, &(0x7f0000000480)='GPL\x00'}, 0x80) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 766.553078ms ago: executing program 0 (id=6974): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000d00008500000083000000bf090000000000005509010000000000950020d000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001400)={{r4}, 0x0, &(0x7f00000013c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000180)=r5, 0x4) sendmsg$inet(r7, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) 685.40388ms ago: executing program 4 (id=6975): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000280)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) sendmsg$unix(r0, &(0x7f0000000040)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) 569.134932ms ago: executing program 4 (id=6976): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001080)={0xffffffffffffffff, 0x18000000000002a0, 0x36, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f086ddeff913e613c26d42000000fbac14140be000031762079f4b4d2f87e5feca6aab845013f232050039", 0x0, 0x2000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x10, 0x3, 0x10, &(0x7f0000003f80)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000022000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e0500009cb20d03e7564c35a8d36774d5e5003a14817ac61e4dd19699a13477bf7e060e3670ef0e789f65f105006704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a080600000002000000ff000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3957663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964ecbeba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c338615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef66fa03a99b5c1c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fib_table_lookup\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x401, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000cfc59dc250b1daef2fa744f0f10f98fa4f1de05e258c27d79cc5fe0715acd697a450ecfa70dcf7b8ff9ae06951ff1799e988e005742693c40a66bb29a4a903c224ee2dc28344915d40dbc93ead"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000008275"], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) 155.691438ms ago: executing program 3 (id=6977): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x97, 0x3, 0x0, 0x40, 0x0, 0x1, 0x60470, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x4, @perf_bp={&(0x7f00000002c0), 0x1}, 0x103c20, 0x0, 0xffffffff, 0x0, 0xf, 0x0, 0x3f, 0x0, 0x6}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x185}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x700, 0xe, 0x0, &(0x7f0000000200)="5c71f905cac413551b2ac0008100", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000040)="9c", 0x0}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000079e02200850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b00010000007ca81bbd1f0811d7040000000000", @ANYRES32=0x0, @ANYBLOB="ffffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000116000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000a40)="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", 0x5a9}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, &(0x7f0000000540), 0x4) (async, rerun: 32) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) sendmsg$tipc(r3, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 125.264358ms ago: executing program 4 (id=6978): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) (async, rerun: 64) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001080)={&(0x7f0000001040)='9p_client_req\x00', r1, 0x0, 0x8}, 0x18) (async) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000005000009000000010000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000099bb3d"], 0x48) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000"], 0x48) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 32) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000011c0)={{r2, 0xffffffffffffffff}, &(0x7f0000001140), &(0x7f0000001180)=r4}, 0x20) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r3, 0x58, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r7}, 0x8) close(r9) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r9, r8, 0x0, r9}, 0x10) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001500)={0x6, 0x19, &(0x7f0000001200)=ANY=[@ANYBLOB="1a00000006000000000000000600000098110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000feffffff18580000060000000000000000000000850000004100000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018400000faffffff0000000000000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000001300)='GPL\x00', 0xb, 0xf3, &(0x7f0000001340)=""/243, 0x41100, 0x34, '\x00', r6, 0x25, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001440)={0x1, 0x10, 0x3, 0x3c2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001480)=[r2, r3], &(0x7f00000014c0)=[{0x2, 0x5, 0x2, 0x6}, {0x0, 0x4, 0xd, 0x2}, {0x3, 0x3, 0x1, 0xb}, {0x3, 0x3, 0xd, 0x2}], 0x10, 0x7a3}, 0x94) (rerun: 64) r10 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x18) close(0xffffffffffffffff) (async) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) (async) r11 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r11}, 0x10) (async, rerun: 32) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) write$cgroup_subtree(r9, &(0x7f00000010c0)={[{0x2d, 'cpuacct'}, {0x0, 'net_cls'}, {0x2b, 'devices'}, {0x2d, 'blkio'}, {0x2d, 'hugetlb'}, {0x2d, 'cpuacct'}, {0x2d, 'rlimit'}, {0x2b, 'blkio'}]}, 0x43) 0s ago: executing program 4 (id=6979): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffff7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0xa0502, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) write$cgroup_int(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0xfffffffffffffff8}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff15, 0x10, &(0x7f0000000000), 0xf000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffff7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) (async) close(r2) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0xa0502, 0x0) (async) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) write$cgroup_int(r2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r4}, 0x10) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) (async) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0xfffffffffffffff8}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff15, 0x10, &(0x7f0000000000), 0xf000000}, 0x48) (async) kernel console output (not intermixed with test programs): illable+0x8c/0xe0 [ 112.250556][ T4182] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 112.257061][ T4182] mem_cgroup_out_of_memory+0x260/0x310 [ 112.262769][ T4182] ? mem_cgroup_oom_trylock+0x350/0x350 [ 112.268624][ T4182] ? _raw_spin_lock+0x8e/0xe0 [ 112.273310][ T4182] ? _raw_spin_trylock_bh+0x130/0x130 [ 112.278681][ T4182] ? _raw_spin_unlock+0x4d/0x70 [ 112.283526][ T4182] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 112.289083][ T4182] ? _raw_spin_unlock_irq+0x4e/0x70 [ 112.294325][ T4182] try_charge+0xf61/0x14e0 [ 112.298749][ T4182] ? __memcg_kmem_charge+0x140/0x140 [ 112.304030][ T4182] ? percpu_counter_add_batch+0x13c/0x160 [ 112.309753][ T4182] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 112.315326][ T4182] __mem_cgroup_charge+0x14c/0x6d0 [ 112.320428][ T4182] shmem_add_to_page_cache+0x55e/0xe10 [ 112.325965][ T4182] ? shmem_alloc_page+0x300/0x300 [ 112.331155][ T4182] ? _raw_spin_lock_irqsave+0x110/0x110 [ 112.336778][ T4182] ? find_lock_entry+0x4b/0x200 [ 112.341618][ T4182] ? lru_cache_add+0x164/0x380 [ 112.346469][ T4182] ? shmem_getpage_gfp+0x8f3/0x2110 [ 112.351667][ T4182] shmem_getpage_gfp+0x8e8/0x2110 [ 112.356687][ T4182] shmem_write_begin+0xce/0x1b0 [ 112.361542][ T4182] generic_perform_write+0x2be/0x510 [ 112.366813][ T4182] ? atime_needs_update+0x5b0/0x5b0 [ 112.371999][ T4182] ? grab_cache_page_write_begin+0xb0/0xb0 [ 112.377796][ T4182] ? file_remove_privs+0x580/0x580 [ 112.382919][ T4182] ? __kasan_check_write+0x14/0x20 [ 112.388022][ T4182] ? down_write+0xac/0x110 [ 112.392439][ T4182] __generic_file_write_iter+0x24b/0x480 [ 112.398063][ T4182] ? generic_write_checks+0x3d4/0x480 [ 112.403425][ T4182] generic_file_write_iter+0xa9/0x1d0 [ 112.408786][ T4182] __kernel_write+0x55a/0x910 [ 112.413481][ T4182] ? vfs_read+0xa10/0xa10 [ 112.417904][ T4182] ? populate_vma_page_range+0xf0/0xf0 [ 112.423355][ T4182] ? __kasan_check_write+0x14/0x20 [ 112.428460][ T4182] ? get_dump_page+0x46b/0x5b0 [ 112.433213][ T4182] dump_emit+0x240/0x360 [ 112.437448][ T4182] ? wait_for_dump_helpers+0x390/0x390 [ 112.442898][ T4182] dump_user_range+0x6a/0x1a0 [ 112.447582][ T4182] elf_core_dump+0x278a/0x2bc0 [ 112.452355][ T4182] ? load_elf_binary+0x2890/0x2890 [ 112.457585][ T4182] ? __fsnotify_parent+0x5ff/0x6c0 [ 112.463325][ T4182] ? shmem_unused_huge_scan+0xa0/0xa0 [ 112.468701][ T4182] ? do_truncate+0x1ad/0x210 [ 112.473278][ T4182] ? putname+0xfe/0x150 [ 112.477426][ T4182] ? __kasan_check_read+0x11/0x20 [ 112.482629][ T4182] ? __ia32_sys_unshare+0x40/0x40 [ 112.487794][ T4182] do_coredump+0x1ac9/0x27f0 [ 112.492482][ T4182] ? simple_acl_create+0x1c0/0x1c0 [ 112.497587][ T4182] ? bpf_trace_run1+0x200/0x200 [ 112.502431][ T4182] ? kmem_cache_free+0x100/0x2d0 [ 112.507356][ T4182] ? ____kasan_slab_free+0x130/0x160 [ 112.512631][ T4182] ? get_signal+0xb98/0x12e0 [ 112.517298][ T4182] ? get_signal+0xb98/0x12e0 [ 112.521883][ T4182] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 112.527853][ T4182] ? kmem_cache_free+0x2ac/0x2d0 [ 112.532784][ T4182] get_signal+0xf23/0x12e0 [ 112.537192][ T4182] arch_do_signal_or_restart+0xbf/0x10f0 [ 112.542825][ T4182] ? force_sig_fault+0xc2/0x110 [ 112.547670][ T4182] ? force_sig_fault_to_task+0x110/0x110 [ 112.553291][ T4182] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 112.558914][ T4182] ? __bad_area_nosemaphore+0x420/0x420 [ 112.564451][ T4182] exit_to_user_mode_loop+0xa2/0xe0 [ 112.569731][ T4182] irqentry_exit_to_user_mode+0x4e/0x80 [ 112.575262][ T4182] irqentry_exit+0x12/0x60 [ 112.579674][ T4182] exc_page_fault+0x67/0xc0 [ 112.584166][ T4182] ? asm_exc_page_fault+0x8/0x30 [ 112.589097][ T4182] asm_exc_page_fault+0x1e/0x30 [ 112.593936][ T4182] RIP: 0033:0x7ff3aa85c837 [ 112.598342][ T4182] Code: 88 15 c2 5e e9 00 88 05 bf 5e e9 00 c3 50 48 8d 35 11 13 1c 00 48 8d 3d 17 13 1c 00 31 c0 e8 30 f7 ff ff 53 89 fb 48 83 ec 10 <64> 8b 04 25 94 ff ff ff 85 c0 74 2a 89 fe 31 c0 bf 3c 00 00 00 e8 [ 112.618025][ T4182] RSP: 002b:00007ff3a8fa3120 EFLAGS: 00010202 [ 112.624091][ T4182] RAX: 0000000000000000 RBX: 000000000000000b RCX: 00007ff3aa99b929 [ 112.632252][ T4182] RDX: 00007ff3a8fa3140 RSI: 00007ff3a8fa3270 RDI: 000000000000000b [ 112.640278][ T4182] RBP: 00007ff3aaa1db39 R08: 0000000000000000 R09: 0000000000000000 [ 112.648432][ T4182] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 112.656411][ T4182] R13: 0000000000000001 R14: 00007ff3aabc3160 R15: 00007fffdfdf42e8 [ 112.667664][ T4182] memory: usage 307200kB, limit 307200kB, failcnt 21491 [ 112.738758][ T4182] memory+swap: usage 427680kB, limit 9007199254740988kB, failcnt 0 [ 112.764855][ T4182] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 112.778110][ T4182] Memory cgroup stats for /syz1: [ 112.778230][ T4182] anon 811008 [ 112.778230][ T4182] file 309129216 [ 112.778230][ T4182] kernel_stack 0 [ 112.778230][ T4182] percpu 0 [ 112.778230][ T4182] sock 0 [ 112.778230][ T4182] shmem 309129216 [ 112.778230][ T4182] file_mapped 0 [ 112.778230][ T4182] file_dirty 135168 [ 112.778230][ T4182] file_writeback 0 [ 112.778230][ T4182] anon_thp 0 [ 112.778230][ T4182] inactive_anon 279764992 [ 112.778230][ T4182] active_anon 34603008 [ 112.778230][ T4182] inactive_file 0 [ 112.778230][ T4182] active_file 57344 [ 112.778230][ T4182] unevictable 0 [ 112.778230][ T4182] slab_reclaimable 0 [ 112.778230][ T4182] slab_unreclaimable 0 [ 112.778230][ T4182] slab 0 [ 112.778230][ T4182] workingset_refault_anon 33 [ 112.778230][ T4182] workingset_refault_file 1749 [ 112.778230][ T4182] workingset_activate_anon 0 [ 112.778230][ T4182] workingset_activate_file 561 [ 112.778230][ T4182] workingset_restore_anon 0 [ 112.778230][ T4182] workingset_restore_file 495 [ 112.881522][ T4182] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz.1.1002,pid=4203,uid=0 [ 112.897099][ T4182] Memory cgroup out of memory: Killed process 4203 (syz.1.1002) total-vm:89964kB, anon-rss:984kB, file-rss:52744kB, shmem-rss:0kB, UID:0 pgtables:188kB oom_score_adj:1000 [ 113.113039][ T4646] device wg2 entered promiscuous mode [ 113.309354][ T4656] device pim6reg1 entered promiscuous mode [ 113.388058][ T4663] syz.0.1136[4663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.390145][ T4663] syz.0.1136[4663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.446339][ T4663] syz.0.1136[4663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.473252][ T4663] syz.0.1136[4663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.777355][ T24] audit: type=1400 audit(1752321354.290:156): avc: denied { create } for pid=4701 comm="syz.0.1148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 115.570565][ T4732] device sit0 left promiscuous mode [ 115.586891][ T4733] device sit0 entered promiscuous mode [ 115.789490][ T4743] device syzkaller0 entered promiscuous mode [ 116.384846][ T4758] device syzkaller0 entered promiscuous mode [ 116.518603][ T4771] device syzkaller0 entered promiscuous mode [ 116.527928][ T4773] device sit0 left promiscuous mode [ 116.993926][ T4794] device wg2 left promiscuous mode [ 117.006732][ T4794] device wg2 entered promiscuous mode [ 117.484911][ T4838] device pim6reg1 entered promiscuous mode [ 118.299490][ T4874] device sit0 left promiscuous mode [ 118.352783][ T4874] device sit0 entered promiscuous mode [ 118.538263][ T4889] device wg2 entered promiscuous mode [ 118.661978][ T4889] device syzkaller0 entered promiscuous mode [ 119.968085][ T4968] syz.4.1222[4968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.968214][ T4968] syz.4.1222[4968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.006332][ T4965] device pim6reg1 entered promiscuous mode [ 120.254554][ T4983] device veth0_vlan left promiscuous mode [ 120.289720][ T4983] device veth0_vlan entered promiscuous mode [ 120.310712][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.347919][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.375941][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 121.826772][ T5037] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.834993][ T5037] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.910470][ T5037] device bridge_slave_1 left promiscuous mode [ 121.922793][ T5037] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.955801][ T5037] device bridge_slave_0 left promiscuous mode [ 121.987069][ T5037] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.521135][ T5087] device pim6reg1 entered promiscuous mode [ 123.831526][ T5132] device sit0 entered promiscuous mode [ 124.200004][ T24] audit: type=1400 audit(1752321363.720:157): avc: denied { create } for pid=5139 comm="syz.4.1273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 125.087692][ T24] audit: type=1400 audit(1752321364.600:158): avc: denied { create } for pid=5177 comm="syz.1.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 125.448041][ T5197] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.711057][ T5213] syz.1.1294[5213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.711140][ T5213] syz.1.1294[5213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.101184][ T24] audit: type=1400 audit(1752321365.610:159): avc: denied { read } for pid=5219 comm="syz.3.1295" dev="nsfs" ino=4026533675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 126.300776][ T5226] device pim6reg1 entered promiscuous mode [ 126.344815][ T24] audit: type=1400 audit(1752321365.650:160): avc: denied { open } for pid=5219 comm="syz.3.1295" path="cgroup:[4026533675]" dev="nsfs" ino=4026533675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 127.058128][ T5246] device wg2 left promiscuous mode [ 127.097817][ T5246] device wg2 entered promiscuous mode [ 127.539847][ T5268] device pim6reg1 entered promiscuous mode [ 127.824386][ T5290] device pim6reg1 entered promiscuous mode [ 127.941273][ T5304] syz.3.1319[5304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.941359][ T5304] syz.3.1319[5304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.946578][ T5336] device pim6reg1 entered promiscuous mode [ 129.154828][ T5352] syz.2.1335[5352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.154872][ T5352] syz.2.1335[5352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.188873][ T5353] syz.2.1335[5353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.688405][ T5545] device pim6reg1 entered promiscuous mode [ 134.837895][ T5552] device sit0 left promiscuous mode [ 138.015621][ T5693] syz.2.1431[5693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.015677][ T5693] syz.2.1431[5693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.095407][ T5736] device syzkaller0 entered promiscuous mode [ 139.363422][ T5739] device syzkaller0 entered promiscuous mode [ 140.073039][ T5791] device syzkaller0 entered promiscuous mode [ 140.240926][ T5801] device pim6reg1 entered promiscuous mode [ 141.366034][ T5846] device pim6reg1 entered promiscuous mode [ 141.973382][ T5859] device wg2 left promiscuous mode [ 142.102469][ T5859] device wg2 entered promiscuous mode [ 142.567780][ T5874] syz.2.1483[5874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.567838][ T5874] syz.2.1483[5874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.687917][ T5874] €Â0: renamed from pim6reg1 [ 143.111007][ T5896] device wg2 left promiscuous mode [ 143.155703][ T5897] device wg2 entered promiscuous mode [ 143.291577][ T5894] device veth0_vlan left promiscuous mode [ 143.340011][ T5894] device veth0_vlan entered promiscuous mode [ 143.360489][ T5911] syz.1.1492[5911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.360574][ T5911] syz.1.1492[5911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.413726][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.471296][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.497802][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.569643][ T5915] device veth1_macvtap entered promiscuous mode [ 143.582410][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 144.211449][ T5966] device syzkaller0 entered promiscuous mode [ 144.431101][ T5973] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 144.459548][ T5973] device syzkaller0 entered promiscuous mode [ 144.873627][ T6001] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.963562][ T6005] device bridge_slave_1 left promiscuous mode [ 145.062048][ T6005] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.097817][ T6005] device bridge_slave_0 left promiscuous mode [ 145.104076][ T6005] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.789124][ T6053] device syzkaller0 entered promiscuous mode [ 150.367038][ T6103] device pim6reg1 entered promiscuous mode [ 150.589252][ T6124] device wg2 left promiscuous mode [ 150.608620][ T6126] device wg2 entered promiscuous mode [ 150.942780][ T6180] device wg2 left promiscuous mode [ 152.192230][ T6221] device syzkaller0 entered promiscuous mode [ 153.014181][ T6263] device pim6reg1 entered promiscuous mode [ 153.021538][ T6263] device pim6reg1 left promiscuous mode [ 153.135802][ T6278] device sit0 entered promiscuous mode [ 154.215888][ T6386] device pim6reg1 entered promiscuous mode [ 155.094165][ T6412] device pim6reg1 entered promiscuous mode [ 155.234647][ T24] audit: type=1400 audit(1752321394.750:161): avc: denied { create } for pid=6417 comm="syz.3.1627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 155.992821][ T6441] syz.2.1633[6441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.992897][ T6441] syz.2.1633[6441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.916022][ T6475] syz.3.1642[6475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.026956][ T6475] syz.3.1642[6475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.902417][ T6522] device pim6reg1 entered promiscuous mode [ 161.172242][ T6591] device pim6reg1 entered promiscuous mode [ 161.557763][ T6606] device sit0 entered promiscuous mode [ 162.054045][ T6633] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 163.456894][ T24] audit: type=1400 audit(1752321402.970:162): avc: denied { create } for pid=6707 comm="syz.1.1719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 164.440949][ T6745] device pim6reg1 entered promiscuous mode [ 164.799248][ T6779] device syzkaller0 entered promiscuous mode [ 165.444721][ T6832] device sit0 entered promiscuous mode [ 166.181476][ T6873] device veth1_macvtap left promiscuous mode [ 166.187582][ T6873] device macsec0 left promiscuous mode [ 167.158759][ T6906] device sit0 left promiscuous mode [ 167.228091][ T6906] device sit0 entered promiscuous mode [ 167.393203][ T6913] device veth0_vlan left promiscuous mode [ 167.436835][ T6913] device veth0_vlan entered promiscuous mode [ 167.503127][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.512158][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.525909][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.617827][ T6929] syz.4.1778 (6929) used obsolete PPPIOCDETACH ioctl [ 167.654536][ T6932] device syzkaller0 entered promiscuous mode [ 167.700991][ T6932] device syzkaller0 left promiscuous mode [ 167.780652][ T6961] device syzkaller0 entered promiscuous mode [ 168.807062][ T7032] device veth0_vlan left promiscuous mode [ 168.827686][ T7032] device veth0_vlan entered promiscuous mode [ 169.638898][ T7081] device syzkaller0 entered promiscuous mode [ 169.865409][ T7112] syz.2.1833[7112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.865486][ T7112] syz.2.1833[7112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.129755][ T7248] device wg2 left promiscuous mode [ 172.465254][ T7282] syz.1.1878[7282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.465335][ T7282] syz.1.1878[7282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.333814][ T7311] device sit0 left promiscuous mode [ 173.578491][ T7311] device sit0 entered promiscuous mode [ 173.906952][ T7323] device syzkaller0 entered promiscuous mode [ 173.916159][ T7318] @ÿ: renamed from bond_slave_0 [ 174.168741][ T7344] device syzkaller0 entered promiscuous mode [ 178.361007][ T7474] device veth1_macvtap left promiscuous mode [ 178.566766][ T7481] device sit0 left promiscuous mode [ 178.712557][ T7481] device sit0 entered promiscuous mode [ 180.104451][ T7542] device sit0 left promiscuous mode [ 180.180120][ T7543] device sit0 entered promiscuous mode [ 182.835625][ T7648] device sit0 left promiscuous mode [ 183.006971][ T7651] device sit0 entered promiscuous mode [ 183.490998][ T7656] syz.1.1985[7656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.491053][ T7656] syz.1.1985[7656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.567550][ T7659] ÿÿÿÿÿÿ: renamed from vlan1 [ 183.718031][ T7674] device vxcan1 entered promiscuous mode [ 185.143033][ T7736] device pim6reg1 entered promiscuous mode [ 185.433792][ T7765] device veth0_vlan left promiscuous mode [ 185.447957][ T7765] device veth0_vlan entered promiscuous mode [ 185.540489][ T7770] device syzkaller0 entered promiscuous mode [ 185.633180][ T7774] device veth1_macvtap left promiscuous mode [ 186.257782][ T7798] device pim6reg1 entered promiscuous mode [ 186.591640][ T7835] device syzkaller0 entered promiscuous mode [ 187.035463][ T7856] device sit0 left promiscuous mode [ 187.323522][ T7861] device macsec0 entered promiscuous mode [ 188.791660][ T7959] device veth0_vlan left promiscuous mode [ 188.807266][ T7959] device veth0_vlan entered promiscuous mode [ 188.847320][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.856801][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.864601][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.910664][ T7971] device sit0 left promiscuous mode [ 188.944474][ T7972] device sit0 left promiscuous mode [ 188.964903][ T7972] device sit0 entered promiscuous mode [ 189.217639][ T7971] device sit0 entered promiscuous mode [ 189.289746][ T7978] device pim6reg1 entered promiscuous mode [ 189.597985][ T7998] device sit0 left promiscuous mode [ 189.670394][ T8001] device veth0_to_team entered promiscuous mode [ 189.719628][ T8009] device pim6reg1 entered promiscuous mode [ 190.113372][ T8038] device pim6reg1 entered promiscuous mode [ 190.409675][ T8047] device wg2 entered promiscuous mode [ 190.715884][ T8073] device sit0 entered promiscuous mode [ 191.462901][ T24] audit: type=1400 audit(1752321430.980:163): avc: denied { create } for pid=8113 comm="syz.1.2112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 191.685175][ T8123] device syzkaller0 entered promiscuous mode [ 191.793412][ T8129] device wg2 entered promiscuous mode [ 193.367548][ T8224] device wg2 entered promiscuous mode [ 194.293226][ T8256] device pim6reg1 entered promiscuous mode [ 194.730277][ T8275] device sit0 entered promiscuous mode [ 195.536418][ T8294] device veth1_macvtap left promiscuous mode [ 195.552497][ T8294] device macsec0 left promiscuous mode [ 195.737340][ T8299] device veth1_macvtap entered promiscuous mode [ 195.743822][ T8299] device macsec0 entered promiscuous mode [ 195.998617][ T8306] device sit0 entered promiscuous mode [ 196.554601][ T8341] device syzkaller0 entered promiscuous mode [ 196.702990][ T8344] device syzkaller0 entered promiscuous mode [ 198.257764][ T8401] device syzkaller0 entered promiscuous mode [ 198.436675][ T8402] device wg2 left promiscuous mode [ 198.636733][ T8419] device pim6reg1 entered promiscuous mode [ 199.711448][ T8484] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 199.721331][ T8484] syzkaller0: persist disabled [ 199.998461][ T8510] device syzkaller0 entered promiscuous mode [ 200.045443][ T410] syzkaller0: tun_net_xmit 76 [ 200.050458][ T410] syzkaller0: tun_net_xmit 48 [ 200.067332][ C1] syzkaller0: tun_net_xmit 76 [ 200.172549][ T8546] device pim6reg1 entered promiscuous mode [ 201.224002][ T8645] device syzkaller0 entered promiscuous mode [ 202.187578][ T8695] device syzkaller0 entered promiscuous mode [ 202.409542][ T8700] device sit0 left promiscuous mode [ 202.550362][ T8702] device sit0 entered promiscuous mode [ 205.973313][ T8734] device veth0_vlan left promiscuous mode [ 206.003657][ T8734] device veth0_vlan entered promiscuous mode [ 206.072142][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.090358][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.106732][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 206.147764][ T8730] device syzkaller0 entered promiscuous mode [ 206.525192][ T8773] @ÿ: renamed from bond_slave_0 [ 206.749761][ T8785] device syzkaller0 entered promiscuous mode [ 206.820744][ T24] audit: type=1400 audit(1752321446.340:164): avc: denied { create } for pid=8786 comm="syz.0.2293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 207.113502][ T24] audit: type=1400 audit(1752321446.630:165): avc: denied { ioctl } for pid=8796 comm="syz.1.2296" path="mnt:[4026532600]" dev="nsfs" ino=4026532600 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 207.499128][ T8814] device pim6reg1 entered promiscuous mode [ 207.649479][ T8828] device wg2 entered promiscuous mode [ 207.725618][ T8839] device pim6reg1 entered promiscuous mode [ 208.601110][ T8869] syz.2.2317[8869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.601198][ T8869] syz.2.2317[8869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.048952][ T8932] device syzkaller0 entered promiscuous mode [ 211.046701][ T8959] device pim6reg1 entered promiscuous mode [ 211.975239][ T8982] device wg2 left promiscuous mode [ 212.019708][ T8984] device wg2 entered promiscuous mode [ 212.041765][ T8986] device sit0 left promiscuous mode [ 212.230464][ T8993] device sit0 entered promiscuous mode [ 212.486019][ T9013] syz.2.2360[9013] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.486128][ T9013] syz.2.2360[9013] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.532296][ T9011] device sit0 left promiscuous mode [ 213.138338][ T9044] device pim6reg1 entered promiscuous mode [ 213.205481][ T9059] syz.1.2372[9059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.205586][ T9059] syz.1.2372[9059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.318686][ T9059] device pim6reg1 entered promiscuous mode [ 213.502560][ T9074] device pim6reg1 entered promiscuous mode [ 215.848971][ T9185] syz.4.2410[9185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.849027][ T9185] syz.4.2410[9185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.065589][ T9188] device veth0_vlan left promiscuous mode [ 216.143576][ T9188] device veth0_vlan entered promiscuous mode [ 216.474424][ T9209] device sit0 left promiscuous mode [ 216.596920][ T9212] device sit0 entered promiscuous mode [ 217.291768][ T9265] device pim6reg1 entered promiscuous mode [ 219.323031][ T9340] device wg2 left promiscuous mode [ 219.330669][ T9340] device wg2 entered promiscuous mode [ 219.650917][ T9344] device syzkaller0 entered promiscuous mode [ 220.642760][ T9362] device syzkaller0 entered promiscuous mode [ 220.701055][ T9364] device wg2 left promiscuous mode [ 221.333866][ T9372] device syzkaller0 entered promiscuous mode [ 223.028164][ T9459] device wg2 entered promiscuous mode [ 223.561037][ T9483] device veth0_vlan left promiscuous mode [ 223.609788][ T9483] device veth0_vlan entered promiscuous mode [ 223.773942][ T9498] device veth0_vlan left promiscuous mode [ 223.826894][ T9498] device veth0_vlan entered promiscuous mode [ 223.993780][ T24] audit: type=1400 audit(1752321463.510:166): avc: denied { read } for pid=9509 comm="syz.1.2499" name="cgroup.subtree_control" dev="cgroup2" ino=310 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 224.276909][ T9531] device pim6reg1 entered promiscuous mode [ 224.308658][ T9537] device veth0_vlan left promiscuous mode [ 224.364947][ T9537] device veth0_vlan entered promiscuous mode [ 224.364956][ T9534] syz.3.2508[9534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.605990][ T9562] device pim6reg1 entered promiscuous mode [ 224.681821][ T9571] device sit0 left promiscuous mode [ 224.722685][ T9572] device sit0 entered promiscuous mode [ 225.368977][ T9628] device syzkaller0 entered promiscuous mode [ 225.460409][ T9635] device syzkaller0 entered promiscuous mode [ 225.909803][ T9659] device pim6reg1 entered promiscuous mode [ 226.578783][ T9705] ÿÿÿÿÿÿ: renamed from vlan1 [ 227.296112][ T9742] device veth1_macvtap left promiscuous mode [ 227.312072][ T9742] device macsec0 left promiscuous mode [ 227.353245][ T9743] device veth1_macvtap entered promiscuous mode [ 227.367420][ T9743] device macsec0 entered promiscuous mode [ 227.434358][ T9757] device syzkaller0 entered promiscuous mode [ 227.557700][ T9767] cgroup: fork rejected by pids controller in /syz0 [ 228.249383][ T9913] device pim6reg1 entered promiscuous mode [ 228.287619][ T9909] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.316037][ T9909] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.348384][ T9909] device bridge_slave_0 entered promiscuous mode [ 228.401142][ T9909] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.416813][ T9909] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.448833][ T9909] device bridge_slave_1 entered promiscuous mode [ 228.786371][ T9909] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.793579][ T9909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.800981][ T9909] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.808042][ T9909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.950283][ T960] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.991438][ T960] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.038910][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.046639][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.077538][ T9] device bridge_slave_1 left promiscuous mode [ 229.083680][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.097932][ T9] device bridge_slave_0 left promiscuous mode [ 229.104272][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.324905][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.333474][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.342223][ T960] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.349296][ T960] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.356855][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.365361][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.373849][ T960] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.380933][ T960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.388511][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.396512][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.404507][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.412719][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.524617][ T9909] device veth0_vlan entered promiscuous mode [ 229.543540][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.556068][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.564909][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.577014][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.634423][T10000] device pim6reg1 entered promiscuous mode [ 229.642082][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.649855][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.698381][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 229.706909][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 229.731509][ T9909] device veth1_macvtap entered promiscuous mode [ 229.744051][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 229.753753][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 229.772210][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 229.782245][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 229.790630][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 229.799163][T10006] device sit0 left promiscuous mode [ 230.372645][T10055] ªªªªªª: renamed from vlan0 [ 230.524733][T10063] device sit0 left promiscuous mode [ 231.122514][T10087] device pim6reg1 entered promiscuous mode [ 231.915461][T10121] device syzkaller0 entered promiscuous mode [ 232.091147][T10137] device sit0 left promiscuous mode [ 232.103482][T10137] device sit0 entered promiscuous mode [ 232.932047][T10153] device wg2 entered promiscuous mode [ 237.051899][T10331] device pim6reg1 entered promiscuous mode [ 237.429967][T10355] device veth0_vlan left promiscuous mode [ 237.464852][T10355] device veth0_vlan entered promiscuous mode [ 237.500461][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.530231][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.545205][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 237.565361][ T24] audit: type=1400 audit(1752321477.080:167): avc: denied { create } for pid=10363 comm="syz.3.2718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 237.785897][T10376] device pim6reg1 entered promiscuous mode [ 238.141740][T10386] device syzkaller0 entered promiscuous mode [ 238.639975][T10420] device bridge_slave_0 entered promiscuous mode [ 238.653178][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.342468][T10445] device wg2 left promiscuous mode [ 239.514876][T10445] device wg2 entered promiscuous mode [ 239.952678][T10470] device bridge_slave_0 left promiscuous mode [ 239.976585][T10471] device bridge_slave_0 entered promiscuous mode [ 240.247353][T10481] device wg2 left promiscuous mode [ 240.296387][T10480] device wg2 entered promiscuous mode [ 240.499679][T10492] device veth1_macvtap entered promiscuous mode [ 240.539922][T10492] device macsec0 entered promiscuous mode [ 240.546197][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.604695][T10501] device macsec0 left promiscuous mode [ 240.698866][T10507] device sit0 left promiscuous mode [ 240.772256][T10512] device sit0 entered promiscuous mode [ 241.183116][T10537] device pim6reg1 entered promiscuous mode [ 241.256288][T10542] syz.0.2770[10542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.256344][T10542] syz.0.2770[10542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.503580][T10567] syz.2.2777[10567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.577394][T10567] syz.2.2777[10567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.930833][T10583] device pim6reg1 entered promiscuous mode [ 242.103822][T10602] device wg2 left promiscuous mode [ 242.138411][T10602] device wg2 entered promiscuous mode [ 242.314364][T10605] device pim6reg1 entered promiscuous mode [ 242.483814][T10609] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 242.489525][T10609] pim6reg0: linktype set to 769 [ 242.494398][T10611] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 242.500366][T10611] pim6reg0: linktype set to 769 [ 243.090119][T10651] device pim6reg1 entered promiscuous mode [ 243.496926][T10662] device syzkaller0 entered promiscuous mode [ 244.353444][T10704] device pim6reg1 entered promiscuous mode [ 244.719878][ T24] audit: type=1400 audit(1752321484.240:168): avc: denied { create } for pid=10717 comm="syz.3.2824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 245.581957][T10737] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.589203][T10737] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.596718][T10737] device bridge_slave_0 entered promiscuous mode [ 245.604069][T10737] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.611255][T10737] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.618851][T10737] device bridge_slave_1 entered promiscuous mode [ 245.695808][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.708085][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.728352][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.736983][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.745192][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.752251][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.796797][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.821872][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.839675][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.846946][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.859454][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.867871][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.923363][T10746] syz.0.2832[10746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.924211][T10746] syz.0.2832[10746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.961189][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.986543][T10737] device veth0_vlan entered promiscuous mode [ 246.006970][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.015500][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.024858][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.033078][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.094975][T10737] device veth1_macvtap entered promiscuous mode [ 246.103269][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.296785][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 246.313284][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 246.680791][T10778] device veth0_vlan left promiscuous mode [ 246.686557][T10778] device veth0_vlan entered promiscuous mode [ 246.853491][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.882155][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.927667][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 248.182459][T10848] device wg2 left promiscuous mode [ 248.248744][T10845] device wg2 entered promiscuous mode [ 248.291476][T10851] device pim6reg1 entered promiscuous mode [ 248.892212][T10860] device syzkaller0 entered promiscuous mode [ 249.752944][T10920] device veth0_vlan left promiscuous mode [ 249.878615][T10920] device veth0_vlan entered promiscuous mode [ 251.752401][T11016] device syzkaller0 entered promiscuous mode [ 251.971977][T11025] device sit0 left promiscuous mode [ 251.993756][T11026] device sit0 entered promiscuous mode [ 252.215827][T11043] device syzkaller0 entered promiscuous mode [ 252.295969][T11040] device syzkaller0 entered promiscuous mode [ 253.214330][T11110] device pim6reg1 entered promiscuous mode [ 255.503877][T11258] device sit0 left promiscuous mode [ 256.002226][T11284] device sit0 entered promiscuous mode [ 257.976640][T11416] device pim6reg1 entered promiscuous mode [ 257.990627][T11419] device wg2 left promiscuous mode [ 258.741560][T11473] device wg2 entered promiscuous mode [ 259.279977][T11502] device syzkaller0 entered promiscuous mode [ 259.741094][T11511] device syzkaller0 entered promiscuous mode [ 260.520109][T11568] device syzkaller0 entered promiscuous mode [ 260.654663][T11581] device pim6reg1 entered promiscuous mode [ 261.748697][T11618] device syzkaller0 entered promiscuous mode [ 264.474154][T11640] device syzkaller0 entered promiscuous mode [ 264.867600][T11661] device syzkaller0 entered promiscuous mode [ 265.043697][T11672] syz.3.3087[11672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.043780][T11672] syz.3.3087[11672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.380495][T11717] device syzkaller0 entered promiscuous mode [ 266.543526][T11735] syz.2.3107[11735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.543613][T11735] syz.2.3107[11735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.614796][T11736] device veth0_vlan left promiscuous mode [ 266.642031][T11736] device veth0_vlan entered promiscuous mode [ 266.660636][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.679566][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.729708][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 266.944066][T11744] device veth0_vlan left promiscuous mode [ 266.958761][T11744] device veth0_vlan entered promiscuous mode [ 267.043054][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.051321][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 267.058929][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.523395][T11772] device sit0 entered promiscuous mode [ 267.895925][T11782] device syzkaller0 entered promiscuous mode [ 268.470128][T11833] device syzkaller0 entered promiscuous mode [ 268.839498][T11851] device syzkaller0 entered promiscuous mode [ 268.900633][T11853] device sit0 left promiscuous mode [ 269.479924][T11859] device syzkaller0 entered promiscuous mode [ 270.813832][T11937] device pim6reg1 entered promiscuous mode [ 271.037888][T11976] device sit0 left promiscuous mode [ 271.081850][T11976] device sit0 entered promiscuous mode [ 271.267292][T12006] device sit0 entered promiscuous mode [ 272.827315][ T24] audit: type=1400 audit(1752321512.340:169): avc: denied { create } for pid=12069 comm="syz.0.3204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 273.129753][T12083] bond_slave_1: mtu less than device minimum [ 273.511608][T12092] device syzkaller0 entered promiscuous mode [ 273.578453][T12101] device pim6reg1 entered promiscuous mode [ 274.443173][T12144] device wg2 entered promiscuous mode [ 275.157782][T12174] device syzkaller0 entered promiscuous mode [ 275.345453][T12177] bridge0: port 3(veth0) entered blocking state [ 275.352199][T12177] bridge0: port 3(veth0) entered disabled state [ 275.382142][T12177] device veth0 entered promiscuous mode [ 275.392375][T12177] bridge0: port 3(veth0) entered blocking state [ 275.399002][T12177] bridge0: port 3(veth0) entered forwarding state [ 275.844641][T12195] device pim6reg1 entered promiscuous mode [ 276.706276][T12245] device veth0_vlan left promiscuous mode [ 276.721131][T12245] device veth0_vlan entered promiscuous mode [ 276.770902][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.790861][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.798586][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.435998][T12266] device pim6reg1 entered promiscuous mode [ 278.525542][T12319] device syzkaller0 entered promiscuous mode [ 278.642241][T12325] Â: renamed from pim6reg1 [ 278.761520][T12331] device pim6reg1 entered promiscuous mode [ 278.924709][T12337] device pim6reg1 entered promiscuous mode [ 279.309316][T12353] ref_ctr_offset mismatch. inode: 0xc2e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 279.341884][T12358] device syzkaller0 entered promiscuous mode [ 279.922701][T12380] device sit0 entered promiscuous mode [ 280.770372][ T24] audit: type=1400 audit(1752321520.280:170): avc: denied { mounton } for pid=12433 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 281.043047][T12433] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.079003][T12433] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.086491][T12433] device bridge_slave_0 entered promiscuous mode [ 281.110593][T12433] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.117688][T12433] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.125153][T12433] device bridge_slave_1 entered promiscuous mode [ 281.219326][T12463] device veth0_to_bridge entered promiscuous mode [ 281.244353][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 281.311501][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 281.366364][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 281.385310][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.409054][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.416265][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.477417][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.485905][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.494568][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.501818][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.509787][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 281.877894][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.898504][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.964470][T12433] device veth0_vlan entered promiscuous mode [ 281.983270][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.995328][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 282.025013][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 282.070195][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 282.235778][T12498] device wg2 left promiscuous mode [ 282.246077][T12501] device wg2 entered promiscuous mode [ 282.260243][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 282.281897][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 282.301055][T12433] device veth1_macvtap entered promiscuous mode [ 282.333974][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 282.357141][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 282.366130][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 282.384565][ T24] audit: type=1400 audit(1752321521.900:171): avc: denied { unmount } for pid=12433 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 282.425119][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 282.464095][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 282.838940][T12541] device sit0 left promiscuous mode [ 282.927609][T12551] device sit0 entered promiscuous mode [ 283.299004][T12564] device syzkaller0 entered promiscuous mode [ 283.584223][T12591] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.705355][ T960] device veth1_macvtap left promiscuous mode [ 284.349612][T12625] device syzkaller0 entered promiscuous mode [ 285.099810][T12656] device syzkaller0 entered promiscuous mode [ 285.626310][T12690] syz.4.3378[12690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.626404][T12690] syz.4.3378[12690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.977911][T12712] device veth0_vlan left promiscuous mode [ 286.009965][T12712] device veth0_vlan entered promiscuous mode [ 286.084119][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.100585][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.137746][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.498591][T12715] device syzkaller0 entered promiscuous mode [ 288.160786][T12778] syz.3.3401[12778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.160843][T12778] syz.3.3401[12778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.298866][T12784] device syzkaller0 entered promiscuous mode [ 288.870697][T12793] device sit0 entered promiscuous mode [ 289.320511][T12810] device syzkaller0 entered promiscuous mode [ 289.761436][T12835] device syzkaller0 entered promiscuous mode [ 289.921709][T12850] device syzkaller0 entered promiscuous mode [ 291.089869][T12896] device veth0_vlan left promiscuous mode [ 291.112274][T12896] device veth0_vlan entered promiscuous mode [ 291.810710][T12947] syz.4.3450[12947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.810797][T12947] syz.4.3450[12947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.942883][T12949] syz.1.3451[12949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.987794][T12949] syz.1.3451[12949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.636738][T13020] device syzkaller0 entered promiscuous mode [ 292.812368][ T24] audit: type=1400 audit(1752321532.330:172): avc: denied { associate } for pid=13019 comm="syz.0.3469" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 292.941929][T13027] kfree: port 1(veth1) entered blocking state [ 292.976359][T13027] kfree: port 1(veth1) entered disabled state [ 293.014146][T13027] device veth1 entered promiscuous mode [ 293.355476][T13060] device syzkaller0 entered promiscuous mode [ 293.773155][T13074] syz.0.3482[13074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.773245][T13074] syz.0.3482[13074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.103009][T13132] device wg2 left promiscuous mode [ 295.129650][T13133] device wg2 entered promiscuous mode [ 295.455889][T13155] device syzkaller0 entered promiscuous mode [ 296.018979][T13183] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 296.115387][T13183] device syzkaller0 entered promiscuous mode [ 296.604120][T13215] GPL: port 1(veth0_to_team) entered blocking state [ 296.617709][T13215] GPL: port 1(veth0_to_team) entered disabled state [ 296.634970][T13215] device veth0_to_team entered promiscuous mode [ 297.156481][T13254] bridge0: port 3(veth1) entered blocking state [ 297.166386][T13254] bridge0: port 3(veth1) entered disabled state [ 297.203556][T13254] device veth1 entered promiscuous mode [ 297.268416][T13254] bridge0: port 3(veth1) entered blocking state [ 297.275180][T13254] bridge0: port 3(veth1) entered forwarding state [ 297.396235][T13263] bridge0: port 3(veth0) entered disabled state [ 297.403743][T13263] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.136084][T13286] ±ÿ: renamed from team_slave_1 [ 298.494134][T13301] device syzkaller0 entered promiscuous mode [ 298.599135][T13306] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.606346][T13306] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.651073][T13313] syz.0.3549[13313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.651168][T13313] syz.0.3549[13313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.692081][T13306] device bridge_slave_1 left promiscuous mode [ 298.741899][T13306] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.758372][T13306] device bridge_slave_0 left promiscuous mode [ 298.771343][T13306] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.039350][T13325] device sit0 left promiscuous mode [ 300.003628][T13405] syz.0.3576[13405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.003682][T13405] syz.0.3576[13405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.102429][T13412] device pim6reg1 entered promiscuous mode [ 300.964547][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.321213][T13488] syz.1.3604[13488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.321264][T13488] syz.1.3604[13488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.362306][T13488] syz.1.3604[13488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.440402][T13488] syz.1.3604[13488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.285567][T13539] device syzkaller0 entered promiscuous mode [ 302.715485][T13575] device pim6reg1 entered promiscuous mode [ 302.867551][T13586] device pim6reg1 entered promiscuous mode [ 303.652720][T13630] device syzkaller0 entered promiscuous mode [ 304.337962][T13694] syz.0.3661[13694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.338022][T13694] syz.0.3661[13694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.480984][T13705] device wg2 left promiscuous mode [ 304.567388][T13708] device wg2 entered promiscuous mode [ 304.676011][T13718] device wg2 left promiscuous mode [ 304.706479][T13719] Â: renamed from pim6reg1 [ 304.738927][T13718] device wg2 entered promiscuous mode [ 304.837962][T13721] device pim6reg1 entered promiscuous mode [ 304.857175][T13726] device sit0 left promiscuous mode [ 304.911398][T13726] device sit0 entered promiscuous mode [ 305.400074][T13753] device pim6reg1 entered promiscuous mode [ 306.459438][T13819] device pim6reg1 entered promiscuous mode [ 306.747986][T13816] device syzkaller0 entered promiscuous mode [ 306.911059][T13840] device veth1_to_bond entered promiscuous mode [ 307.067462][T13858] device veth0_vlan left promiscuous mode [ 307.092590][T13858] device veth0_vlan entered promiscuous mode [ 307.353866][T13878] device veth1_macvtap left promiscuous mode [ 307.363511][T13878] device macsec0 entered promiscuous mode [ 307.691733][T13893] device sit0 left promiscuous mode [ 308.349268][T13936] Â: renamed from pim6reg1 [ 309.733080][T13979] device syzkaller0 entered promiscuous mode [ 309.801433][T13993] device pim6reg1 entered promiscuous mode [ 311.003400][T14036] bridge0: port 3(veth1) entered disabled state [ 311.009913][T14036] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.017093][T14036] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.236336][T14039] device sit0 left promiscuous mode [ 311.446525][T14073] device syzkaller0 entered promiscuous mode [ 312.457968][T14107] device syzkaller0 entered promiscuous mode [ 312.848819][T14139] device pim6reg1 entered promiscuous mode [ 313.622230][T14183] device pim6reg1 entered promiscuous mode [ 313.798233][T14190] syz.1.3805[14190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.798319][T14190] syz.1.3805[14190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.852085][T14190] syz.1.3805[14190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.989756][T14190] syz.1.3805[14190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.974920][T14257] device pim6reg1 entered promiscuous mode [ 315.182556][T14266] device sit0 entered promiscuous mode [ 315.478693][T14288] syz.1.3832[14288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.478748][T14288] syz.1.3832[14288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.212387][T14416] device pim6reg1 entered promiscuous mode [ 318.209458][T14456] device sit0 entered promiscuous mode [ 318.427054][T14479] Q±6ã×\b‹¡Y­4: renamed from lo [ 321.449802][T14614] device veth0_vlan left promiscuous mode [ 321.460238][T14614] device veth0_vlan entered promiscuous mode [ 321.499385][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.509416][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.518931][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.859589][T14638] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.866859][T14638] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.967771][T14638] device bridge_slave_0 entered promiscuous mode [ 322.018552][T14638] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.026002][T14638] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.033719][T14638] device bridge_slave_1 entered promiscuous mode [ 322.357447][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.365114][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.399287][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.435316][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.447598][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.454686][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.462624][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.471183][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.497392][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.504465][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.512319][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 322.560598][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.569608][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.592264][T14638] device veth0_vlan entered promiscuous mode [ 322.604704][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 322.613438][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.626562][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.639642][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.694211][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.708470][T14638] device veth1_macvtap entered promiscuous mode [ 322.842168][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.851758][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 323.173280][T14691] device syzkaller0 entered promiscuous mode [ 323.358590][T14694] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.365754][T14694] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.377873][T14694] device bridge_slave_0 entered promiscuous mode [ 323.385317][T14694] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.395879][T14694] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.403667][T14694] device bridge_slave_1 entered promiscuous mode [ 323.709582][ T356] device veth0_vlan left promiscuous mode [ 324.044571][T14694] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.051660][T14694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.058957][T14694] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.066014][T14694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.277516][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.287089][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.327654][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 324.339228][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.346876][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 324.358990][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.359161][T14749] syz.0.3954[14749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.367761][T14749] syz.0.3954[14749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.368368][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.397668][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.415519][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 324.425438][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.434443][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.441612][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.449323][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 324.457928][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 324.466056][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 324.474482][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.491629][T14749] device veth0_vlan left promiscuous mode [ 324.504712][T14749] device veth0_vlan entered promiscuous mode [ 324.541994][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 324.550432][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 324.558221][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 324.574635][T14694] device veth0_vlan entered promiscuous mode [ 324.585436][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 324.594071][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 324.602716][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 324.611875][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 324.629746][T14694] device veth1_macvtap entered promiscuous mode [ 324.636578][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 324.644492][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 324.652180][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 324.661556][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.687695][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 324.843921][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 324.852761][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 324.888436][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 324.897528][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 326.069644][ T356] device veth1_macvtap left promiscuous mode [ 333.084258][T14787] syz.1.3966[14787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.084316][T14787] syz.1.3966[14787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.127604][T14787] syz.1.3966[14787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.233554][T14787] syz.1.3966[14787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.443001][T14804] ÿÿÿÿÿÿ: renamed from vlan1 [ 335.415366][T14943] device syzkaller0 entered promiscuous mode [ 336.261451][T14993] device syzkaller0 entered promiscuous mode [ 336.692526][T15016] device veth0_vlan left promiscuous mode [ 336.729161][T15016] device veth0_vlan entered promiscuous mode [ 337.090178][T15049] device pim6reg1 entered promiscuous mode [ 337.391095][T15073] device veth0_vlan left promiscuous mode [ 337.419888][T15073] device veth0_vlan entered promiscuous mode [ 337.665939][T15096] device veth1 left promiscuous mode [ 337.674492][T15096] bridge0: port 3(veth1) entered disabled state [ 337.698584][T15096] device bridge_slave_1 left promiscuous mode [ 337.704792][T15096] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.713836][T15096] device bridge_slave_0 left promiscuous mode [ 337.723745][T15096] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.479433][T15147] device pim6reg1 entered promiscuous mode [ 338.486123][T15143] device wg2 entered promiscuous mode [ 338.595054][T15152] device syzkaller0 entered promiscuous mode [ 339.940955][T15235] device sit0 left promiscuous mode [ 340.067888][T15238] device sit0 entered promiscuous mode [ 340.566670][T15289] device wg2 left promiscuous mode [ 340.634092][T15292] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.642877][T15292] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.811053][T15298] device veth0_vlan left promiscuous mode [ 340.822981][T15298] device veth0_vlan entered promiscuous mode [ 340.870310][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 340.879719][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.897583][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 341.042947][T15322] device vlan0 entered promiscuous mode [ 341.351342][T15338] €Â0: renamed from pim6reg1 [ 342.719819][T15417] device sit0 entered promiscuous mode [ 343.127539][T15445] device syzkaller0 entered promiscuous mode [ 343.349940][T15464] syz.1.4153[15464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.349998][T15464] syz.1.4153[15464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.623149][ T24] audit: type=1400 audit(1752321583.140:173): avc: denied { create } for pid=15483 comm="syz.2.4160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 344.724271][T15559] device wg2 left promiscuous mode [ 344.780649][T15559] device wg2 entered promiscuous mode [ 345.376669][T15580] device sit0 left promiscuous mode [ 347.458616][T15693] device sit0 left promiscuous mode [ 348.138675][T15729] device pim6reg1 left promiscuous mode [ 351.276999][T15825] device veth0_vlan left promiscuous mode [ 351.289063][T15825] device veth0_vlan entered promiscuous mode [ 351.306443][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.318328][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 351.408440][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.881625][T15841] Â: renamed from pim6reg1 [ 352.838286][T15907] device pim6reg1 entered promiscuous mode [ 353.032134][T15914] syz.2.4282[15914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.032226][T15914] syz.2.4282[15914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.217963][T15981] syz.0.4300[15981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.237355][T15981] syz.0.4300[15981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.110365][T16036] device syzkaller0 entered promiscuous mode [ 355.527784][T16065] device syzkaller0 entered promiscuous mode [ 355.986972][T16093] syz.0.4336[16093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.987027][T16093] syz.0.4336[16093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.540544][T16130] device sit0 entered promiscuous mode [ 360.912347][T16239] device veth0_vlan left promiscuous mode [ 360.931890][T16239] device veth0_vlan entered promiscuous mode [ 360.993220][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.002232][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 361.010003][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.159079][T16255] device pim6reg1 entered promiscuous mode [ 363.235853][T16407] device syzkaller0 entered promiscuous mode [ 363.913368][T16439] device pim6reg1 entered promiscuous mode [ 364.063763][T16438] device pim6reg1 left promiscuous mode [ 364.923505][T16467] device pim6reg1 entered promiscuous mode [ 365.070725][T16472] device syzkaller0 entered promiscuous mode [ 365.560975][T16493] device pimreg0 entered promiscuous mode [ 367.366080][T16632] device veth0_vlan left promiscuous mode [ 367.389304][T16632] device veth0_vlan entered promiscuous mode [ 367.431229][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 367.448680][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 367.466418][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 367.973167][T16665] device vxcan1 entered promiscuous mode [ 368.015065][T16665] syz.0.4492[16665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.015148][T16665] syz.0.4492[16665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.185126][T16704] device sit0 left promiscuous mode [ 368.512679][T16719] device syzkaller0 entered promiscuous mode [ 369.125784][T16748] device syzkaller0 entered promiscuous mode [ 370.125031][T16808] device pim6reg1 entered promiscuous mode [ 370.460867][T16840] device macsec0 left promiscuous mode [ 370.510743][T16840] device macsec0 entered promiscuous mode [ 370.526156][T16840] device veth1_macvtap entered promiscuous mode [ 370.679475][T16856] device sit0 left promiscuous mode [ 370.792300][T16856] device sit0 entered promiscuous mode [ 370.956289][T16860] device syzkaller0 entered promiscuous mode [ 372.293401][T16958] tap0: tun_chr_ioctl cmd 21731 [ 373.011418][T16981] device syzkaller0 entered promiscuous mode [ 373.808298][T17052] device veth1_macvtap left promiscuous mode [ 373.857588][T17052] device pim6reg1 entered promiscuous mode [ 374.815120][T17105] device pim6reg1 entered promiscuous mode [ 375.887855][T17156] device sit0 entered promiscuous mode [ 376.143560][T17162] device syzkaller0 entered promiscuous mode [ 376.228314][T17171] device syzkaller0 entered promiscuous mode [ 376.459770][T17202] device pim6reg1 entered promiscuous mode [ 377.349069][T17244] device pim6reg1 entered promiscuous mode [ 377.524897][T17246] syz.1.4656[17246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.524987][T17246] syz.1.4656[17246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.459343][T17348] device wg2 left promiscuous mode [ 379.526005][T17349] device wg2 entered promiscuous mode [ 380.446595][T17405] device sit0 entered promiscuous mode [ 380.531865][T17399] device wg2 left promiscuous mode [ 380.548229][T17412] device wg2 entered promiscuous mode [ 380.830864][T17435] device syzkaller0 entered promiscuous mode [ 382.943593][T17524] device syzkaller0 entered promiscuous mode [ 383.683606][T17566] device wg2 entered promiscuous mode [ 384.843168][T17617] device pim6reg1 entered promiscuous mode [ 386.975381][T17718] device syzkaller0 entered promiscuous mode [ 388.232489][T17741] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.267936][T17741] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.275545][T17741] device bridge_slave_0 entered promiscuous mode [ 388.282795][T17741] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.291373][T17741] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.299248][T17741] device bridge_slave_1 entered promiscuous mode [ 388.489986][T17741] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.497592][T17741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.504922][T17741] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.512003][T17741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.728995][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 388.740019][T15017] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.789767][T15017] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.858376][ T7] device bridge_slave_1 left promiscuous mode [ 388.864637][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.875748][ T7] device bridge_slave_0 left promiscuous mode [ 388.884197][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.898329][ T7] device veth1_macvtap left promiscuous mode [ 389.098214][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 389.116661][T15017] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.123867][T15017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.131926][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 389.140454][T15017] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.147604][T15017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.155638][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 389.166486][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 389.299713][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 389.317725][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 389.401549][T17741] device veth0_vlan entered promiscuous mode [ 389.420843][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 389.458408][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 389.483010][T17741] device veth1_macvtap entered promiscuous mode [ 389.505218][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 389.513229][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 389.544560][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 389.568026][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 389.582234][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 389.731716][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 389.740568][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 389.749526][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 389.758260][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 389.863535][T17793] syz.2.4791[17793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.863601][T17793] syz.2.4791[17793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.397841][T17797] Â: renamed from pim6reg1 [ 392.318507][T17895] device veth1_macvtap left promiscuous mode [ 392.324631][T17895] device macsec0 left promiscuous mode [ 392.879073][T17927] device sit0 left promiscuous mode [ 393.879651][ T24] audit: type=1400 audit(1752321633.400:174): avc: denied { setattr } for pid=17996 comm="syz.4.4866" path="pipe:[51126]" dev="pipefs" ino=51126 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 394.474553][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 394.507840][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 394.549016][ T960] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 394.772666][T18039] device veth0_vlan left promiscuous mode [ 394.859267][T18039] device veth0_vlan entered promiscuous mode [ 395.220949][T18082] device syzkaller0 entered promiscuous mode [ 395.372654][T18070] device syzkaller0 entered promiscuous mode [ 395.697678][T18099] device veth0_vlan left promiscuous mode [ 395.725856][T18099] device veth0_vlan entered promiscuous mode [ 396.921429][T18157] device pim6reg1 left promiscuous mode [ 398.669101][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 398.698324][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 398.707286][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 398.722414][T18217] bridge0: port 3(veth1) entered blocking state [ 398.737606][T18217] bridge0: port 3(veth1) entered disabled state [ 398.829898][T18217] device veth1 entered promiscuous mode [ 398.836770][T18217] bridge0: port 3(veth1) entered blocking state [ 398.843347][T18217] bridge0: port 3(veth1) entered forwarding state [ 399.009130][T18234] device syzkaller0 entered promiscuous mode [ 399.074715][T18240] device syzkaller0 entered promiscuous mode [ 399.133962][T18247] device pim6reg1 entered promiscuous mode [ 399.393498][T18265] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.400748][T18265] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.408533][T18265] device bridge_slave_0 entered promiscuous mode [ 399.420884][T18265] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.443678][T18265] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.451515][T18265] device bridge_slave_1 entered promiscuous mode [ 399.459702][T18283] device wg2 entered promiscuous mode [ 399.640914][T18265] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.648021][T18265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.655403][T18265] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.662564][T18265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.766321][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.780358][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.796048][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 399.803557][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 399.828734][T18308] bridge0: port 3(veth1) entered blocking state [ 399.835796][T18308] bridge0: port 3(veth1) entered disabled state [ 399.878601][T18308] device veth1 entered promiscuous mode [ 399.898275][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 399.906596][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 399.914833][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.921885][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.930567][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 399.939048][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 399.947282][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.954311][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.970068][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 399.978169][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 399.986995][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 399.995434][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 400.044806][T18342] device veth1_macvtap left promiscuous mode [ 400.196214][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 400.205173][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 400.219562][T18265] device veth0_vlan entered promiscuous mode [ 400.244839][T18358] device syzkaller0 entered promiscuous mode [ 400.257585][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 400.265570][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 400.299051][ T7] device veth1 left promiscuous mode [ 400.304677][ T7] kfree: port 1(veth1) entered disabled state [ 400.346401][ T7] device veth0_vlan left promiscuous mode [ 400.762703][T18265] device veth1_macvtap entered promiscuous mode [ 400.772551][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 400.781896][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 400.798518][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 400.815631][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 400.833653][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 400.956158][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 400.977591][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 401.051352][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 401.083334][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 402.392624][T18436] device pim6reg1 entered promiscuous mode [ 406.158068][T18555] device wg2 left promiscuous mode [ 406.919333][T18620] bridge0: port 4(veth1) entered blocking state [ 406.946867][T18620] bridge0: port 4(veth1) entered disabled state [ 407.035983][T18620] device veth1 entered promiscuous mode [ 407.981236][T18679] device wg2 entered promiscuous mode [ 408.161186][T18685] device sit0 entered promiscuous mode [ 410.020798][T18810] device wg2 left promiscuous mode [ 410.043455][T18810] device wg2 entered promiscuous mode [ 410.063772][T18810] bridge0: port 3(veth1) entered disabled state [ 410.070898][T18810] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.079139][T18810] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.133236][T18833] device veth1 left promiscuous mode [ 410.183270][T18833] bridge0: port 3(veth1) entered disabled state [ 410.209413][T18833] device bridge_slave_1 left promiscuous mode [ 410.215638][T18833] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.223077][T18833] device bridge_slave_0 left promiscuous mode [ 410.229360][T18833] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.072212][T18874] device syzkaller0 entered promiscuous mode [ 411.632693][T18902] device pim6reg1 left promiscuous mode [ 411.693204][T18906] device syzkaller0 entered promiscuous mode [ 412.732467][T18978] device syzkaller0 entered promiscuous mode [ 412.754475][T18992] device syzkaller0 entered promiscuous mode [ 412.761905][T18992] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 413.208999][T19010] device syzkaller0 entered promiscuous mode [ 413.482511][T19036] syz.4.5166[19036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.482571][T19036] syz.4.5166[19036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.056448][T19135] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 415.497789][T19145] device pim6reg1 entered promiscuous mode [ 416.607211][T19200] device veth1_macvtap entered promiscuous mode [ 416.647286][T19200] device macsec0 entered promiscuous mode [ 416.653748][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 418.145456][T19262] device veth0_virt_wifi entered promiscuous mode [ 418.734874][T19285] device syzkaller0 entered promiscuous mode [ 419.189743][T19301] syz.2.5243[19301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.189801][T19301] syz.2.5243[19301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.208589][T19299] device veth1_to_bond entered promiscuous mode [ 419.415657][T19303] device syzkaller0 entered promiscuous mode [ 419.485796][T19309] ªªªªªª: renamed from vlan0 [ 419.638300][T19314] device sit0 left promiscuous mode [ 419.725015][T19332] device sit0 entered promiscuous mode [ 420.365062][T19368] device wg2 entered promiscuous mode [ 421.269067][T19438] device pim6reg1 entered promiscuous mode [ 421.503492][T19445] device syzkaller0 entered promiscuous mode [ 421.570199][T19453] device syzkaller0 entered promiscuous mode [ 421.814936][T19473] device sit0 entered promiscuous mode [ 421.947123][T19477] device syzkaller0 entered promiscuous mode [ 422.385301][T19500] syz.0.5305[19500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.462582][T19504] device sit0 left promiscuous mode [ 422.597242][T19504] device sit0 entered promiscuous mode [ 423.000440][T19537] ÿÿÿÿÿÿ: renamed from vlan1 [ 423.529734][T19580] device pim6reg1 entered promiscuous mode [ 423.706332][T19597] device pim6reg1 entered promiscuous mode [ 423.943142][T19608] device pim6reg1 entered promiscuous mode [ 425.559014][T19682] device syzkaller0 entered promiscuous mode [ 426.066923][T19722] device pim6reg1 entered promiscuous mode [ 426.266804][T19732] device sit0 entered promiscuous mode [ 427.393153][T19779] device sit0 left promiscuous mode [ 428.169018][T19800] device veth0_vlan left promiscuous mode [ 428.220917][T19800] device veth0_vlan entered promiscuous mode [ 428.265455][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 428.277645][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 428.311455][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 428.430753][T19822] syz.4.5397[19822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.430853][T19822] syz.4.5397[19822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.481708][T19820] device pim6reg1 left promiscuous mode [ 428.701338][T19842] device sit0 entered promiscuous mode [ 429.364703][T19891] device pim6reg1 entered promiscuous mode [ 429.506283][T19896] device syzkaller0 entered promiscuous mode [ 429.740850][T19902] device veth0_vlan left promiscuous mode [ 429.814446][T19902] device veth0_vlan entered promiscuous mode [ 429.844366][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 429.879617][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 429.897469][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 430.033219][T19918] syz.1.5425[19918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.033279][T19918] syz.1.5425[19918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.015923][T19975] device syzkaller0 entered promiscuous mode [ 431.883568][T20003] device pim6reg1 entered promiscuous mode [ 431.903320][T20007] device veth1_macvtap left promiscuous mode [ 431.909962][T20007] device macsec0 entered promiscuous mode [ 432.863668][T20029] device syzkaller0 entered promiscuous mode [ 433.774588][T20067] device veth0_vlan left promiscuous mode [ 433.813154][T20067] device veth0_vlan entered promiscuous mode [ 433.865966][T20067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 433.910115][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 433.937612][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 433.985403][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 435.241448][T20076] device pim6reg1 entered promiscuous mode [ 435.651515][T20125] syz.3.5485[20125] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.651575][T20125] syz.3.5485[20125] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.731672][T20126] device veth1_macvtap left promiscuous mode [ 435.947929][T20127] device veth1_macvtap entered promiscuous mode [ 436.149564][T20125] device veth0_vlan left promiscuous mode [ 436.171770][T20125] device veth0_vlan entered promiscuous mode [ 436.237368][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 436.256638][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 436.284032][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 436.716718][T20153] syz.2.5491[20153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.716771][T20153] syz.2.5491[20153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.134829][T20169] device pim6reg1 entered promiscuous mode [ 437.329713][T20187] syz.2.5501[20187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.329773][T20187] syz.2.5501[20187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.196271][T20218] device syzkaller0 entered promiscuous mode [ 438.624484][T20275] device syzkaller0 entered promiscuous mode [ 439.292107][T20300] device syzkaller0 entered promiscuous mode [ 439.546293][ T24] audit: type=1400 audit(1752321679.050:175): avc: denied { create } for pid=20318 comm="syz.2.5533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 439.611863][T20322] device veth0_vlan left promiscuous mode [ 439.641320][T20322] device veth0_vlan entered promiscuous mode [ 439.682145][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 439.710662][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 439.733626][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 439.763829][T20325] device sit0 left promiscuous mode [ 439.822663][T20329] device sit0 entered promiscuous mode [ 439.837903][T20331] device sit0 left promiscuous mode [ 439.851080][T20332] device sit0 left promiscuous mode [ 439.904180][T20328] device sit0 entered promiscuous mode [ 440.042046][T20339] device sit0 left promiscuous mode [ 440.055216][T20341] device sit0 entered promiscuous mode [ 441.291922][T20372] device veth1_macvtap left promiscuous mode [ 441.484541][T20369] device syzkaller0 entered promiscuous mode [ 442.278751][T20434] device sit0 entered promiscuous mode [ 442.333278][T20436] device sit0 left promiscuous mode [ 442.463686][T20436] device sit0 entered promiscuous mode [ 442.853404][T20453] device pim6reg1 entered promiscuous mode [ 443.280347][T20479] device pim6reg1 entered promiscuous mode [ 443.471113][T20488] device veth0_vlan left promiscuous mode [ 443.482782][T20488] device veth0_vlan entered promiscuous mode [ 443.521633][T20488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 443.561612][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 443.570089][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 443.577679][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 444.175911][T20548] device sit0 left promiscuous mode [ 444.231022][T20548] device sit0 entered promiscuous mode [ 444.388657][T20555] device syzkaller0 entered promiscuous mode [ 444.444162][T20566] device sit0 left promiscuous mode [ 444.513872][T20566] device sit0 entered promiscuous mode [ 444.781072][T20592] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.788363][T20592] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.882026][T20598] device pim6reg1 entered promiscuous mode [ 445.740037][T20645] device wg2 left promiscuous mode [ 445.797532][T20652] syz.1.5633[20652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.797592][T20652] syz.1.5633[20652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.443611][T20664] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.462533][T20664] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.470342][T20664] device bridge_slave_0 entered promiscuous mode [ 446.477567][T20664] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.484623][T20664] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.492064][T20664] device bridge_slave_1 entered promiscuous mode [ 446.544189][T20670] device syzkaller0 entered promiscuous mode [ 446.777947][T20664] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.785038][T20664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 446.792355][T20664] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.799393][T20664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 446.932027][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 446.939843][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.948580][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.980487][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 447.008586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 447.019358][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.026429][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 447.049355][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 447.098679][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 447.117253][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 447.124347][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 447.175226][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 447.190044][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 447.227953][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 447.240036][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 447.262688][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 447.317473][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 447.401159][T20719] device pim6reg1 entered promiscuous mode [ 447.415519][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 447.427654][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 447.448473][T20664] device veth0_vlan entered promiscuous mode [ 447.460470][T20721] €Â0: renamed from pim6reg1 [ 447.467760][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 447.475474][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 447.540474][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 447.552270][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 447.562844][T20664] device veth1_macvtap entered promiscuous mode [ 447.626408][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 447.639874][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 447.650568][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 447.659302][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 447.667759][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 448.088293][ T356] device veth0_to_team left promiscuous mode [ 448.095683][ T356] GPL: port 1(veth0_to_team) entered disabled state [ 448.135060][ T356] device veth1 left promiscuous mode [ 448.156095][ T356] bridge0: port 4(veth1) entered disabled state [ 448.171827][ T356] device veth0 left promiscuous mode [ 448.178023][ T356] bridge0: port 3(veth0) entered disabled state [ 448.196024][ T356] device bridge_slave_1 left promiscuous mode [ 448.206967][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.215130][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 448.406445][T20774] device sit0 left promiscuous mode [ 450.284537][T20846] device dummy0 entered promiscuous mode [ 450.410146][T20859] A6±ÿ: renamed from team_slave_1 [ 450.514941][T20871] device pim6reg1 entered promiscuous mode [ 450.695864][T20880] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.703540][T20880] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.711507][T20880] device bridge_slave_0 entered promiscuous mode [ 450.732530][T20880] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.740051][T20880] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.748302][T20880] device bridge_slave_1 entered promiscuous mode [ 450.802860][T20880] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.809936][T20880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.817340][T20880] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.824506][T20880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.835092][T20892] device pim6reg1 entered promiscuous mode [ 450.858415][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 450.867951][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.875564][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.893788][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 450.902461][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.909539][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.917640][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 450.928096][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.935153][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.008701][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 451.043980][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 451.112490][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 451.145889][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 451.154808][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 451.177974][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 451.199416][T20880] device veth0_vlan entered promiscuous mode [ 451.260940][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 451.285345][T20880] device veth1_macvtap entered promiscuous mode [ 451.341522][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 451.349996][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 451.359603][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 451.367996][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 451.511374][T20913] device bridge0 entered promiscuous mode [ 451.861080][T20943] device sit0 left promiscuous mode [ 452.084497][T20944] device sit0 entered promiscuous mode [ 453.054672][T20992] device sit0 entered promiscuous mode [ 453.261666][T20997] Â: renamed from pim6reg1 [ 454.448290][T21043] device veth0_vlan left promiscuous mode [ 454.459822][T21043] device veth0_vlan entered promiscuous mode [ 454.483398][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 454.496222][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 454.538259][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 454.666243][T21048] device veth0_vlan left promiscuous mode [ 454.673404][T21048] device veth0_vlan entered promiscuous mode [ 454.699798][T21056] device veth1_to_bond entered promiscuous mode [ 455.713324][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 456.238546][T21180] syz.4.5783[21180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.241927][T21180] syz.4.5783[21180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 458.889744][T21217] Â: renamed from pim6reg1 [ 460.430269][T21310] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.437419][T21310] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.445182][T21310] device bridge_slave_0 entered promiscuous mode [ 460.452624][T21310] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.459885][T21310] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.467655][T21310] device bridge_slave_1 entered promiscuous mode [ 460.545605][T21310] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.552817][T21310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.560130][T21310] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.567196][T21310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.591924][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 460.600604][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.608318][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.627837][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 460.646625][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.654467][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.679431][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 460.695514][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.702609][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.739221][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 460.798085][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 460.808236][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 460.956000][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 460.988170][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 461.027046][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 461.125085][T21310] device veth0_vlan entered promiscuous mode [ 461.138163][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 461.146761][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 461.156754][T21310] device veth1_macvtap entered promiscuous mode [ 461.182364][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 461.202719][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 461.221736][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 461.237451][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 461.256163][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 461.710086][T21342] device syzkaller0 entered promiscuous mode [ 462.058778][ T49] device veth1_macvtap left promiscuous mode [ 463.816771][T21375] device syzkaller0 entered promiscuous mode [ 465.641700][T21522] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.649165][T21522] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.656949][T21522] device bridge0 left promiscuous mode [ 465.696332][T21522] device bridge_slave_1 left promiscuous mode [ 465.704443][T21522] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.712332][T21522] device bridge_slave_0 left promiscuous mode [ 465.718856][T21522] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.000539][T21622] syz.5.5907[21622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.000609][T21622] syz.5.5907[21622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.018175][T21622] syz.5.5907[21622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.033172][T21622] syz.5.5907[21622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.405358][T21635] device sit0 entered promiscuous mode [ 469.487365][T21695] syz.5.5925[21695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.487426][T21695] syz.5.5925[21695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.569377][T21704] device wg2 entered promiscuous mode [ 469.719259][T21709] device macsec0 entered promiscuous mode [ 469.773288][T21713] device sit0 entered promiscuous mode [ 469.929184][T21732] device pim6reg1 entered promiscuous mode [ 470.597794][T21763] device wg2 entered promiscuous mode [ 471.337322][T21810] device pim6reg1 entered promiscuous mode [ 471.457968][T21820] bridge0: port 3(veth1) entered blocking state [ 471.464600][T21820] bridge0: port 3(veth1) entered forwarding state [ 471.471201][T21820] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.478474][T21820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 471.485921][T21820] bridge0: port 1(bridge_slave_0) entered blocking state [ 471.493007][T21820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 471.547795][T21820] device bridge0 entered promiscuous mode [ 471.780266][T21859] device veth0_vlan left promiscuous mode [ 471.845088][T21859] device veth0_vlan entered promiscuous mode [ 471.942141][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 472.043264][T21881] device pim6reg1 entered promiscuous mode [ 472.071245][T21879] device pim6reg1 entered promiscuous mode [ 472.384806][T21926] syz.0.5989[21926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.384902][T21926] syz.0.5989[21926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.937449][T21962] Â: renamed from pim6reg1 [ 473.055568][T21987] device sit0 left promiscuous mode [ 473.073358][T21987] device sit0 entered promiscuous mode [ 473.958416][T22034] device wg2 left promiscuous mode [ 473.995688][T22034] device wg2 entered promiscuous mode [ 475.883943][T22143] device pim6reg1 entered promiscuous mode [ 475.970879][T22149] Ÿë: port 1(veth0_to_team) entered blocking state [ 475.978831][T22149] Ÿë: port 1(veth0_to_team) entered disabled state [ 475.985735][T22149] device veth0_to_team entered promiscuous mode [ 475.994752][T22149] Ÿë: port 2(erspan0) entered blocking state [ 476.000979][T22149] Ÿë: port 2(erspan0) entered disabled state [ 476.007585][T22149] device erspan0 entered promiscuous mode [ 476.174637][T22164] device syzkaller0 entered promiscuous mode [ 476.532260][T22190] device syzkaller0 entered promiscuous mode [ 476.558042][T22190] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 477.439326][T22235] device syzkaller0 entered promiscuous mode [ 477.668841][T22259] device pim6reg1 entered promiscuous mode [ 477.852817][T22274] device veth1_macvtap left promiscuous mode [ 477.863501][T22274] device macsec0 left promiscuous mode [ 478.333461][T22291] device syzkaller0 entered promiscuous mode [ 478.609611][T22307] syz.5.6101[22307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.609717][T22307] syz.5.6101[22307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 479.544908][T22332] device pim6reg1 entered promiscuous mode [ 479.846307][T22360] syz.0.6116[22360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 479.846368][T22360] syz.0.6116[22360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 479.982687][T22357] syz.0.6116[22357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.090647][T22357] syz.0.6116[22357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.667882][T22396] device syzkaller0 entered promiscuous mode [ 481.492199][T22419] device veth0_vlan left promiscuous mode [ 481.536754][T22419] device veth0_vlan entered promiscuous mode [ 481.564312][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 481.578802][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 481.627482][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 482.101955][T22463] device syzkaller0 entered promiscuous mode [ 482.270526][T22476] Â: renamed from pim6reg1 [ 482.391191][T22487] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.422832][T22482] device syzkaller0 entered promiscuous mode [ 482.437983][T22487] bridge0: port 1(bridge_slave_0) entered blocking state [ 482.445074][T22487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 483.207920][T22535] device pim6reg1 entered promiscuous mode [ 483.610073][T22560] Â: renamed from pim6reg1 [ 483.633104][T22559] device sit0 left promiscuous mode [ 483.733643][T22565] device syzkaller0 entered promiscuous mode [ 484.340894][T22612] device pim6reg1 entered promiscuous mode [ 484.630913][T22637] syz.5.6188[22637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.631008][T22637] syz.5.6188[22637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.986732][T22670] syz.5.6195[22670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.998684][T22670] syz.5.6195[22670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.143046][T22658] device syzkaller0 entered promiscuous mode [ 485.508895][T22682] device sit0 left promiscuous mode [ 485.583049][T22684] syz.5.6201[22684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.583106][T22684] syz.5.6201[22684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 486.871874][T22721] device veth1_macvtap entered promiscuous mode [ 486.963743][T22724] device macsec0 entered promiscuous mode [ 487.041621][T15017] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 487.237918][T22731] device veth0_vlan left promiscuous mode [ 487.250855][T22731] device veth0_vlan entered promiscuous mode [ 487.265045][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 487.304213][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 487.323699][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 487.509715][T22743] device veth1_macvtap entered promiscuous mode [ 487.516900][T22743] device macsec0 entered promiscuous mode [ 487.551026][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 487.740078][T22762] device pim6reg1 entered promiscuous mode [ 488.013648][T22778] device sit0 left promiscuous mode [ 488.588591][T22814] device syzkaller0 entered promiscuous mode [ 488.757000][T22833] device veth1_macvtap left promiscuous mode [ 489.226200][T22862] device sit0 entered promiscuous mode [ 489.395047][T22865] device wg2 left promiscuous mode [ 489.445845][T22871] device wg2 entered promiscuous mode [ 489.677518][T22877] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 489.851199][T22894] device sit0 entered promiscuous mode [ 490.252808][T22910] ªªªªªª: renamed from vlan0 [ 490.339020][T22908] device pim6reg1 entered promiscuous mode [ 491.751633][T22971] device veth0_vlan left promiscuous mode [ 491.780695][T22971] device veth0_vlan entered promiscuous mode [ 491.871562][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 491.887850][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 491.954639][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 492.242218][T22999] bridge0: port 3(veth1) entered disabled state [ 492.248577][T22999] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.255667][T22999] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.330450][T22999] device bridge0 left promiscuous mode [ 492.456323][T23015] device syzkaller0 entered promiscuous mode [ 492.757908][T23056] syzkaller0: tun_chr_ioctl cmd 35092 [ 493.240432][T23092] device pim6reg1 entered promiscuous mode [ 493.692358][T23126] syz.4.6337[23126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.692416][T23126] syz.4.6337[23126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.743474][T23129] device syzkaller0 entered promiscuous mode [ 494.993487][T23194] syz.3.6356[23194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.993547][T23194] syz.3.6356[23194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 495.506133][T23207] device syzkaller0 entered promiscuous mode [ 495.731192][T23218] device wg2 entered promiscuous mode [ 495.988158][T23226] device pim6reg1 entered promiscuous mode [ 496.067559][T23222] device veth0_vlan left promiscuous mode [ 496.074683][T23222] device veth0_vlan entered promiscuous mode [ 496.138457][T23230] device sit0 left promiscuous mode [ 498.900596][T23312] device pim6reg1 entered promiscuous mode [ 499.457149][T23320] device syzkaller0 entered promiscuous mode [ 501.122934][T23368] device syzkaller0 entered promiscuous mode [ 501.959366][T23406] Â: renamed from pim6reg1 [ 503.102687][T23464] device veth1_macvtap left promiscuous mode [ 503.145324][T23465] device veth1_macvtap entered promiscuous mode [ 503.226795][T23464] device pim6reg1 entered promiscuous mode [ 503.622774][T23477] device veth1_macvtap left promiscuous mode [ 503.629075][T23477] device macsec0 left promiscuous mode [ 503.639253][T23477] device veth1_macvtap entered promiscuous mode [ 503.646011][T23477] device macsec0 entered promiscuous mode [ 503.986791][T23506] syz.5.6441[23506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.986855][T23506] syz.5.6441[23506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.259385][T23532] device pim6reg1 entered promiscuous mode [ 504.625667][T23576] syz.5.6460[23576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.625721][T23576] syz.5.6460[23576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.632096][T23575] syz.5.6460[23575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.656384][T23575] syz.5.6460[23575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 505.151405][T23600] device sit0 left promiscuous mode [ 507.709054][T23698] device wg2 left promiscuous mode [ 507.734937][T23698] device wg2 entered promiscuous mode [ 507.844694][T23709] device pim6reg1 entered promiscuous mode [ 507.919517][T23710] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.926759][T23710] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.225395][T23730] tap0: tun_chr_ioctl cmd 1074025680 [ 508.269491][T23730] device sit0 left promiscuous mode [ 508.675708][T23757] device pim6reg1 entered promiscuous mode [ 508.990098][T23764] device wg2 entered promiscuous mode [ 509.537303][T23791] device sit0 entered promiscuous mode [ 510.055927][T23807] device sit0 left promiscuous mode [ 510.287870][T23824] device bridge_slave_1 left promiscuous mode [ 510.296690][T23824] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.343697][T23824] device bridge_slave_0 left promiscuous mode [ 510.353447][T23824] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.240447][T23897] device pim6reg1 entered promiscuous mode [ 511.666191][T23905] device wg2 left promiscuous mode [ 511.811181][T23932] syz.0.6551[23932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.811267][T23932] syz.0.6551[23932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 512.050103][T23943] tun0: tun_chr_ioctl cmd 1074025676 [ 512.088822][T23943] tun0: owner set to 0 [ 514.102995][T24045] syz.5.6581[24045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 514.495591][T24065] device veth1 left promiscuous mode [ 514.545169][T24065] bridge0: port 3(veth1) entered disabled state [ 514.559713][T24065] device bridge_slave_1 left promiscuous mode [ 514.566188][T24065] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.583914][T24065] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.665445][T24067] lo: mtu less than device minimum [ 514.981652][T24090] device pim6reg1 entered promiscuous mode [ 514.990399][T24092] syz.3.6591[24092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 514.990483][T24092] syz.3.6591[24092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.974604][T24123] device wg2 entered promiscuous mode [ 516.334933][T24125] Â: renamed from pim6reg1 [ 517.026821][T24136] device syzkaller0 entered promiscuous mode [ 519.347403][T24214] device sit0 entered promiscuous mode [ 520.075395][T24279] device veth0_vlan left promiscuous mode [ 520.086173][T24279] device veth0_vlan entered promiscuous mode [ 520.126602][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 520.134875][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 520.143462][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 520.623224][T24323] syz.3.6657[24323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 520.625217][T24323] syz.3.6657[24323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 520.637883][T24324] syz.3.6657[24324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 520.680383][T24324] syz.3.6657[24324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 520.832733][T24334] device pim6reg1 entered promiscuous mode [ 520.919650][T24336] device wg2 left promiscuous mode [ 521.048970][T24345] device pim6reg1 entered promiscuous mode [ 521.055794][T24347] device bridge_slave_1 left promiscuous mode [ 521.067747][T24347] bridge0: port 2(bridge_slave_1) entered disabled state [ 521.083373][T24347] device bridge_slave_0 left promiscuous mode [ 521.090396][T24347] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.177973][T24336] device wg2 entered promiscuous mode [ 521.442682][T24370] device veth1_macvtap left promiscuous mode [ 521.457570][T24370] device macsec0 left promiscuous mode [ 521.477728][T24370] syz.0.6670[24370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.477786][T24370] syz.0.6670[24370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.499771][T24372] device sit0 entered promiscuous mode [ 521.767453][T24379] syz.4.6673[24379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.767564][T24379] syz.4.6673[24379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 522.008616][T24395] device syzkaller0 left promiscuous mode [ 522.148488][T24405] syz.4.6681[24405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 522.148546][T24405] syz.4.6681[24405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 522.224579][T24412] device sit0 entered promiscuous mode [ 527.585819][T24636] device wg2 left promiscuous mode [ 527.977544][T24660] bpf_get_probe_write_proto: 2 callbacks suppressed [ 527.977554][T24660] syz.1.6753[24660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.984369][T24660] syz.1.6753[24660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.112002][T24669] syz.3.6756[24669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.142415][T24669] syz.3.6756[24669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.881646][T24709] syz.5.6765[24709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 529.028679][T24714] ip6erspan0: tun_chr_ioctl cmd 1074025677 [ 529.107930][T24714] ip6erspan0: linktype set to 805 [ 529.756048][T24734] device sit0 left promiscuous mode [ 529.795827][T24743] device wg2 entered promiscuous mode [ 529.828208][T24747] device pim6reg1 entered promiscuous mode [ 530.079425][T24768] device pim6reg1 entered promiscuous mode [ 530.644973][T24809] device pim6reg1 entered promiscuous mode [ 531.343002][T24846] device pim6reg1 entered promiscuous mode [ 531.685782][T24856] syz.0.6812[24856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 531.685887][T24856] syz.0.6812[24856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 531.882367][T24872] device wg2 left promiscuous mode [ 531.981431][T24877] device syzkaller0 entered promiscuous mode [ 533.101376][T24913] device veth0_vlan left promiscuous mode [ 533.180697][T24913] device veth0_vlan entered promiscuous mode [ 534.207405][T24943] device veth0_vlan left promiscuous mode [ 534.279124][T24943] device veth0_vlan entered promiscuous mode [ 534.297787][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 534.306285][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 534.330292][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 535.953357][T25012] device veth0_vlan left promiscuous mode [ 535.972297][T25012] device veth0_vlan entered promiscuous mode [ 539.273889][T25132] device veth0_vlan left promiscuous mode [ 539.295013][T25132] device veth0_vlan entered promiscuous mode [ 539.677792][T25173] device pim6reg1 entered promiscuous mode [ 539.779888][T25176] device syzkaller0 entered promiscuous mode [ 541.333151][T25239] device sit0 entered promiscuous mode [ 541.745115][T25267] device veth0_vlan left promiscuous mode [ 541.761567][T25267] device veth0_vlan entered promiscuous mode [ 542.233621][T25286] device syzkaller0 entered promiscuous mode [ 543.287476][T25327] device sit0 entered promiscuous mode [ 543.622877][T25333] Â: renamed from pim6reg1 [ 646.207036][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 646.213691][ C1] rcu: 1-...!: (10000 ticks this GP) idle=5e2/1/0x4000000000000000 softirq=84280/84280 fqs=0 last_accelerate: 5fda/86eb dyntick_enabled: 1 [ 646.228083][ C1] (t=10000 jiffies g=98909 q=428) [ 646.233208][ C1] rcu: rcu_preempt kthread starved for 10000 jiffies! g98909 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 646.244674][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 646.255256][ C1] rcu: RCU grace-period kthread stack dump: [ 646.261161][ C1] task:rcu_preempt state:I stack: 0 pid: 13 ppid: 2 flags:0x00004000 [ 646.270459][ C1] Call Trace: [ 646.273759][ C1] __schedule+0xb47/0x1310 [ 646.278818][ C1] ? release_firmware_map_entry+0x190/0x190 [ 646.285589][ C1] ? __mod_timer+0x7ae/0xb30 [ 646.290305][ C1] schedule+0x13c/0x1d0 [ 646.294444][ C1] schedule_timeout+0x12c/0x2d0 [ 646.299278][ C1] ? console_conditional_schedule+0x10/0x10 [ 646.305391][ C1] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 646.310908][ C1] ? run_local_timers+0x160/0x160 [ 646.316174][ C1] ? prepare_to_swait_event+0x320/0x340 [ 646.321718][ C1] rcu_gp_kthread+0x100a/0x26a0 [ 646.326568][ C1] ? rcu_barrier_callback+0x50/0x50 [ 646.331930][ C1] ? __kasan_check_read+0x11/0x20 [ 646.337382][ C1] ? __kthread_parkme+0xb9/0x1c0 [ 646.342325][ C1] kthread+0x346/0x3d0 [ 646.346378][ C1] ? rcu_barrier_callback+0x50/0x50 [ 646.351644][ C1] ? kthread_blkcg+0xd0/0xd0 [ 646.356409][ C1] ret_from_fork+0x1f/0x30 [ 646.360929][ C1] NMI backtrace for cpu 1 [ 646.365338][ C1] CPU: 1 PID: 25424 Comm: syz.3.6977 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 646.376861][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 646.387082][ C1] Call Trace: [ 646.390465][ C1] [ 646.393323][ C1] __dump_stack+0x21/0x24 [ 646.397651][ C1] dump_stack_lvl+0x169/0x1d8 [ 646.402362][ C1] ? show_regs_print_info+0x18/0x18 [ 646.407838][ C1] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 646.413385][ C1] ? _raw_spin_lock+0xe0/0xe0 [ 646.418056][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 646.424774][ C1] dump_stack+0x15/0x1c [ 646.428913][ C1] nmi_trigger_cpumask_backtrace+0x27f/0x2c0 [ 646.434959][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 646.441082][ C1] rcu_dump_cpu_stacks+0x19c/0x2c0 [ 646.446295][ C1] rcu_sched_clock_irq+0xf79/0x1870 [ 646.451811][ C1] ? rcutree_dead_cpu+0x2f0/0x2f0 [ 646.457223][ C1] ? hrtimer_run_queues+0x166/0x430 [ 646.462660][ C1] update_process_times+0x198/0x200 [ 646.469555][ C1] tick_sched_timer+0x17c/0x240 [ 646.475182][ C1] ? tick_setup_sched_timer+0x450/0x450 [ 646.481015][ C1] __hrtimer_run_queues+0x37a/0x960 [ 646.486562][ C1] ? hrtimer_interrupt+0xdc0/0xdc0 [ 646.491962][ C1] ? ktime_get_update_offsets_now+0x293/0x2b0 [ 646.498253][ C1] hrtimer_interrupt+0x3a6/0xdc0 [ 646.503346][ C1] __sysvec_apic_timer_interrupt+0xfa/0x3f0 [ 646.509434][ C1] asm_call_irq_on_stack+0xf/0x20 [ 646.514715][ C1] [ 646.517675][ C1] sysvec_apic_timer_interrupt+0x85/0xe0 [ 646.523597][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 646.529689][ C1] RIP: 0010:tipc_sk_rcv+0x24e/0x1ef0 [ 646.535047][ C1] Code: 24 48 01 00 00 42 80 3c 20 00 74 08 48 89 df e8 18 85 43 fd 4c 8b 23 49 39 dc 0f 84 5c 01 00 00 31 ff 44 89 f6 e8 52 98 09 fd <4d> 8d bc 24 e0 00 00 00 4c 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 [ 646.554895][ C1] RSP: 0018:ffffc900010e69e0 EFLAGS: 00000293 [ 646.561059][ C1] RAX: ffffffff8459ff6e RBX: ffffc900010e6e40 RCX: 0000000000000000 [ 646.569024][ C1] RDX: ffff88811fb6e2c0 RSI: 00000000ba6269e1 RDI: 0000000000000000 [ 646.576995][ C1] RBP: ffffc900010e6c50 R08: 0000000000000004 R09: 0000000000000003 [ 646.584969][ C1] R10: fffff5200021cd2c R11: 1ffff9200021cd2c R12: ffff888116ce8000 [ 646.593547][ C1] R13: ffffc900010e6e50 R14: 00000000ba6269e1 R15: 00000000ba6269e1 [ 646.601988][ C1] ? tipc_sk_rcv+0x24e/0x1ef0 [ 646.607577][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 646.613636][ C1] ? __stack_depot_save+0x479/0x4c0 [ 646.618892][ C1] ? kasan_set_track+0x5b/0x70 [ 646.623668][ C1] ? kasan_set_track+0x4a/0x70 [ 646.628418][ C1] ? ____kasan_slab_free+0x125/0x160 [ 646.633968][ C1] ? __kasan_slab_free+0x11/0x20 [ 646.638987][ C1] ? kmem_cache_free+0x100/0x2d0 [ 646.643990][ C1] ? kfree_skbmem+0x10c/0x180 [ 646.648818][ C1] ? kfree_skb+0xc1/0x2f0 [ 646.653224][ C1] ? sock_setsockopt+0x125e/0x2350 [ 646.658733][ C1] ? __sys_setsockopt+0x265/0x460 [ 646.663781][ C1] ? do_syscall_64+0x31/0x40 [ 646.668357][ C1] ? __skb_queue_purge+0x170/0x170 [ 646.674094][ C1] tipc_node_xmit+0x256/0xcd0 [ 646.678962][ C1] ? bpf_trace_run2+0xb8/0x200 [ 646.683711][ C1] ? bpf_trace_run1+0x200/0x200 [ 646.688538][ C1] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 646.694253][ C1] ? ____kasan_slab_free+0x130/0x160 [ 646.699522][ C1] ? kfree_skbmem+0x10c/0x180 [ 646.704204][ C1] ? kfree_skbmem+0x10c/0x180 [ 646.708877][ C1] ? __bpf_trace_kmem_free+0x6f/0x90 [ 646.714154][ C1] tipc_node_distr_xmit+0x292/0x390 [ 646.719406][ C1] ? tipc_node_xmit_skb+0x130/0x130 [ 646.724796][ C1] ? trace_tipc_sk_rej_msg+0x2c/0x6d0 [ 646.730242][ C1] tipc_sk_rcv+0x19b9/0x1ef0 [ 646.734814][ C1] ? __skb_queue_purge+0x170/0x170 [ 646.739919][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 646.745275][ C1] ? sched_clock+0x3a/0x40 [ 646.749669][ C1] ? sched_clock_cpu+0x1b/0x3d0 [ 646.754702][ C1] ? sched_clock+0x3a/0x40 [ 646.759261][ C1] tipc_node_xmit+0x256/0xcd0 [ 646.763938][ C1] ? debug_smp_processor_id+0x17/0x20 [ 646.769452][ C1] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 646.775009][ C1] ? irq_exit_rcu+0x9/0x10 [ 646.779512][ C1] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 646.785401][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 646.791712][ C1] tipc_sk_filter_rcv+0x1581/0x3850 [ 646.796982][ C1] ? tipc_sk_dump+0xfc0/0xfc0 [ 646.801735][ C1] ? memset_erms+0xb/0x10 [ 646.806305][ C1] tipc_sk_rcv+0x7cc/0x1ef0 [ 646.810794][ C1] ? __bpf_trace_kmem_free+0x6f/0x90 [ 646.816071][ C1] ? kmem_cache_free+0x2ac/0x2d0 [ 646.821251][ C1] ? __skb_queue_purge+0x170/0x170 [ 646.826341][ C1] ? tipc_sk_filter_rcv+0x3034/0x3850 [ 646.831694][ C1] tipc_node_xmit+0x256/0xcd0 [ 646.836365][ C1] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 646.842289][ C1] tipc_node_distr_xmit+0x292/0x390 [ 646.847566][ C1] ? tipc_node_xmit_skb+0x130/0x130 [ 646.853070][ C1] ? __irq_exit_rcu+0x40/0x150 [ 646.857834][ C1] tipc_sk_backlog_rcv+0x16f/0x1f0 [ 646.862935][ C1] ? tipc_sk_timeout+0x970/0x970 [ 646.867857][ C1] __release_sock+0x146/0x360 [ 646.872520][ C1] sock_setsockopt+0x125e/0x2350 [ 646.877443][ C1] ? __sock_set_mark+0x160/0x160 [ 646.882463][ C1] ? selinux_socket_setsockopt+0x21c/0x300 [ 646.888348][ C1] ? selinux_socket_getsockopt+0x2e0/0x2e0 [ 646.894148][ C1] ? __fget_files+0x2c4/0x320 [ 646.898811][ C1] ? security_socket_setsockopt+0x82/0xa0 [ 646.904533][ C1] __sys_setsockopt+0x265/0x460 [ 646.909454][ C1] ? __ia32_sys_recv+0xb0/0xb0 [ 646.914395][ C1] ? irq_exit_rcu+0x9/0x10 [ 646.918826][ C1] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 646.924613][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 646.930794][ C1] __x64_sys_setsockopt+0xbf/0xd0 [ 646.935958][ C1] do_syscall_64+0x31/0x40 [ 646.940382][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 646.946268][ C1] RIP: 0033:0x7fc32d93b929 [ 646.950854][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 646.971000][ C1] RSP: 002b:00007fc32bfa4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 646.979412][ C1] RAX: ffffffffffffffda RBX: 00007fc32db62fa0 RCX: 00007fc32d93b929 [ 646.987611][ C1] RDX: 0000000000000021 RSI: 0000000000000001 RDI: 0000000000000006 [ 646.995587][ C1] RBP: 00007fc32d9bdb39 R08: 0000000000000004 R09: 0000000000000000 [ 647.003752][ C1] R10: 0000200000000540 R11: 0000000000000246 R12: 0000000000000000 [ 647.011884][ C1] R13: 0000000000000000 R14: 00007fc32db62fa0 R15: 00007ffc255d4c48 [ 683.004964][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz.3.6977:25423] [ 683.013502][ C0] Modules linked in: [ 683.018057][ C0] CPU: 0 PID: 25423 Comm: syz.3.6977 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 683.029764][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 683.040286][ C0] RIP: 0010:kvm_wait+0xc2/0x120 [ 683.045583][ C0] Code: 38 f0 75 26 41 f7 c4 00 02 00 00 75 0f 0f 1f 44 00 00 0f 00 2d 3f 9d 98 03 f4 eb 0e 0f 1f 44 00 00 0f 00 2d 30 9d 98 03 fb f4 <4c> 89 64 24 18 ff 74 24 18 9d 48 c7 44 24 20 0e 36 e0 45 4b c7 04 [ 683.065966][ C0] RSP: 0018:ffffc90000edf9c0 EFLAGS: 00000246 [ 683.072122][ C0] RAX: 0000000000000003 RBX: ffff888119032888 RCX: ffffffff814b175a [ 683.080095][ C0] RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff888119032888 [ 683.088068][ C0] RBP: ffffc90000edfa70 R08: dffffc0000000000 R09: ffffed1023206512 [ 683.096066][ C0] R10: ffffed1023206512 R11: 1ffff11023206511 R12: 0000000000000246 [ 683.104050][ C0] R13: 1ffff11023206511 R14: dffffc0000000000 R15: 1ffff920001dbf3c [ 683.112024][ C0] FS: 000055555d60a500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 683.120983][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 683.127657][ C0] CR2: 0000001b2ed20220 CR3: 0000000113294000 CR4: 00000000003506b0 [ 683.135813][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 683.143873][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 683.151843][ C0] Call Trace: [ 683.155166][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 683.161321][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 683.166446][ C0] ? __pv_queued_spin_lock_slowpath+0x6ba/0xb70 [ 683.172864][ C0] __pv_queued_spin_lock_slowpath+0x714/0xb70 [ 683.178939][ C0] ? __pv_queued_spin_unlock_slowpath+0x280/0x280 [ 683.185531][ C0] ? task_work_add+0x27/0x1e0 [ 683.190518][ C0] ? fput+0x1a/0x20 [ 683.194452][ C0] ? filp_close+0x105/0x150 [ 683.199339][ C0] ? __close_range+0x1ca/0x430 [ 683.204107][ C0] ? do_syscall_64+0x31/0x40 [ 683.208974][ C0] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 683.215043][ C0] queued_spin_lock_slowpath+0x47/0x50 [ 683.220501][ C0] _raw_spin_lock_bh+0xd8/0xe0 [ 683.225450][ C0] ? _raw_spin_lock_irq+0xe0/0xe0 [ 683.230618][ C0] lock_sock_nested+0x92/0x290 [ 683.235520][ C0] ? locks_remove_posix+0x530/0x530 [ 683.240814][ C0] ? sock_init_data+0xc0/0xc0 [ 683.245587][ C0] ? fsnotify+0x1967/0x1a80 [ 683.250177][ C0] tipc_release+0x56/0x1490 [ 683.254796][ C0] ? down_read_killable+0xe0/0xe0 [ 683.260886][ C0] sock_close+0xe0/0x270 [ 683.265134][ C0] ? sock_mmap+0xa0/0xa0 [ 683.269376][ C0] __fput+0x2fb/0x770 [ 683.273356][ C0] ____fput+0x15/0x20 [ 683.277439][ C0] task_work_run+0x127/0x190 [ 683.282559][ C0] exit_to_user_mode_loop+0xcb/0xe0 [ 683.288618][ C0] syscall_exit_to_user_mode+0x68/0x90 [ 683.294084][ C0] do_syscall_64+0x3d/0x40 [ 683.298624][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 683.304556][ C0] RIP: 0033:0x7fc32d93b929 [ 683.309271][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 683.329957][ C0] RSP: 002b:00007ffc255d4da8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 683.338394][ C0] RAX: 0000000000000000 RBX: 00007fc32db64ba0 RCX: 00007fc32d93b929 [ 683.346470][ C0] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 683.354606][ C0] RBP: 00007fc32db64ba0 R08: 0000000000000000 R09: 0000000f255d509f [ 683.363000][ C0] R10: 00007fc32db64ac0 R11: 0000000000000246 R12: 000000000008589d [ 683.371468][ C0] R13: 00007ffc255d4ea0 R14: ffffffffffffffff R15: 00007ffc255d4ec0 [ 683.379647][ C0] Sending NMI from CPU 0 to CPUs 1: [ 683.385982][ C1] NMI backtrace for cpu 1 [ 683.385989][ C1] CPU: 1 PID: 25424 Comm: syz.3.6977 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 683.385994][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 683.385997][ C1] RIP: 0010:update_stack_state+0x368/0x480 [ 683.386005][ C1] Code: 03 49 bc 00 00 00 00 00 fc ff df 42 80 3c 20 00 74 08 4c 89 f7 e8 58 d8 6e 00 48 8b 45 d0 49 89 06 48 8b 45 98 42 80 3c 20 00 <4c> 8b 75 c8 4c 8b 6d c0 74 08 4c 89 f7 e8 36 d8 6e 00 49 c7 06 00 [ 683.386008][ C1] RSP: 0018:ffffc90000170550 EFLAGS: 00000046 [ 683.386016][ C1] RAX: 1ffff9200002e0ef RBX: ffffc90000170720 RCX: ffffc900010e6c01 [ 683.386020][ C1] RDX: ffffc900010e6c50 RSI: 1ffff9200002e0e5 RDI: ffffc90000170778 [ 683.386023][ C1] RBP: ffffc90000170610 R08: dffffc0000000001 R09: ffffc90000170720 [ 683.386028][ C1] R10: fffff5200002e0f0 R11: 1ffff9200002e0e4 R12: dffffc0000000000 [ 683.386032][ C1] R13: 0000000000000000 R14: ffffc90000170758 R15: 1ffff9200002e0ec [ 683.386036][ C1] FS: 00007fc32bfa46c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 683.386039][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 683.386043][ C1] CR2: 0000000100000000 CR3: 0000000113294000 CR4: 00000000003506a0 [ 683.386047][ C1] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 683.386051][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 683.386054][ C1] Call Trace: [ 683.386056][ C1] [ 683.386059][ C1] unwind_next_frame+0x3d5/0x700 [ 683.386062][ C1] ? tipc_sk_rcv+0x3eb/0x1ef0 [ 683.386065][ C1] perf_callchain_kernel+0x464/0x5c0 [ 683.386068][ C1] ? bcmp+0x3c/0xd0 [ 683.386071][ C1] ? arch_perf_update_userpage+0x3b0/0x3b0 [ 683.386074][ C1] ? tipc_sk_rcv+0x3eb/0x1ef0 [ 683.386077][ C1] ? debug_smp_processor_id+0x17/0x20 [ 683.386080][ C1] ? get_callchain_entry+0x170/0x380 [ 683.386084][ C1] get_perf_callchain+0x376/0x480 [ 683.386087][ C1] ? put_callchain_entry+0xb0/0xb0 [ 683.386090][ C1] ? __perf_event_header__init_id+0x46a/0x5a0 [ 683.386093][ C1] ? kvm_is_in_guest+0x28/0x40 [ 683.386096][ C1] perf_prepare_sample+0x32e/0x1930 [ 683.386099][ C1] ? perf_reboot+0xf0/0xf0 [ 683.386102][ C1] ? perf_callchain+0x1a0/0x1a0 [ 683.386105][ C1] ? ttwu_do_activate+0x1e2/0x2b0 [ 683.386109][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 683.386112][ C1] perf_event_output_forward+0xb5/0x160 [ 683.386116][ C1] ? perf_prepare_sample+0x1930/0x1930 [ 683.386119][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 683.386122][ C1] ? __perf_event_account_interrupt+0x183/0x2a0 [ 683.386125][ C1] __perf_event_overflow+0x1b3/0x340 [ 683.386129][ C1] perf_swevent_hrtimer+0x3db/0x530 [ 683.386132][ C1] ? cpu_clock_event_read+0x50/0x50 [ 683.386135][ C1] ? __kasan_check_read+0x11/0x20 [ 683.386138][ C1] ? trigger_load_balance+0x1a4/0x870 [ 683.386141][ C1] ? timerqueue_add+0x20a/0x230 [ 683.386144][ C1] ? cpu_clock_event_read+0x50/0x50 [ 683.386148][ C1] ? cpu_clock_event_read+0x50/0x50 [ 683.386151][ C1] __hrtimer_run_queues+0x37a/0x960 [ 683.386154][ C1] ? hrtimer_interrupt+0xdc0/0xdc0 [ 683.386157][ C1] ? ktime_get_update_offsets_now+0x293/0x2b0 [ 683.386161][ C1] hrtimer_interrupt+0x3a6/0xdc0 [ 683.386164][ C1] __sysvec_apic_timer_interrupt+0xfa/0x3f0 [ 683.386167][ C1] asm_call_irq_on_stack+0xf/0x20 [ 683.386170][ C1] [ 683.386173][ C1] sysvec_apic_timer_interrupt+0x85/0xe0 [ 683.386176][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 683.386179][ C1] RIP: 0010:bcmp+0x3c/0xd0 [ 683.386188][ C1] Code: 84 a5 00 00 00 48 bb 00 00 00 00 00 fc ff df 45 31 f6 4a 8d 04 37 48 89 c1 48 c1 e9 03 0f b6 0c 19 84 c9 75 2d 42 0f b6 04 37 <4a> 8d 0c 36 49 89 c8 49 c1 e8 03 45 0f b6 04 18 45 84 c0 75 3b 42 [ 683.386191][ C1] RSP: 0018:ffffc900010e68a0 EFLAGS: 00000246 [ 683.386199][ C1] RAX: 00000000000000e1 RBX: dffffc0000000000 RCX: 0000000000000000 [ 683.386203][ C1] RDX: 0000000000000004 RSI: ffffc900010e6960 RDI: ffff888119032b5c [ 683.386208][ C1] RBP: ffffc900010e68d0 R08: 0000000000000004 R09: 0000000000000003 [ 683.386213][ C1] R10: fffff5200021cd2c R11: 1ffff9200021cd2c R12: 0000000000000004 [ 683.386217][ C1] R13: ffff888119032be8 R14: 0000000000000000 R15: fffffffffffffc18 [ 683.386221][ C1] tipc_sk_lookup+0x2f3/0x5f0 [ 683.386224][ C1] ? tipc_sk_rcv+0x1ef0/0x1ef0 [ 683.386228][ C1] ? tipc_sk_rcv+0x1a47/0x1ef0 [ 683.386231][ C1] tipc_sk_rcv+0x3eb/0x1ef0 [ 683.386235][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 683.386238][ C1] ? __stack_depot_save+0x479/0x4c0 [ 683.386242][ C1] ? kasan_set_track+0x5b/0x70 [ 683.386245][ C1] ? kasan_set_track+0x4a/0x70 [ 683.386248][ C1] ? ____kasan_slab_free+0x125/0x160 [ 683.386251][ C1] ? __kasan_slab_free+0x11/0x20 [ 683.386255][ C1] ? kmem_cache_free+0x100/0x2d0 [ 683.386258][ C1] ? kfree_skbmem+0x10c/0x180 [ 683.386261][ C1] ? kfree_skb+0xc1/0x2f0 [ 683.386265][ C1] ? sock_setsockopt+0x125e/0x2350 [ 683.386268][ C1] ? __sys_setsockopt+0x265/0x460 [ 683.386271][ C1] ? do_syscall_64+0x31/0x40 [ 683.386275][ C1] ? __skb_queue_purge+0x170/0x170 [ 683.386278][ C1] tipc_node_xmit+0x256/0xcd0 [ 683.386282][ C1] ? bpf_trace_run2+0xb8/0x200 [ 683.386285][ C1] ? bpf_trace_run1+0x200/0x200 [ 683.386288][ C1] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 683.386292][ C1] ? ____kasan_slab_free+0x130/0x160 [ 683.386295][ C1] ? kfree_skbmem+0x10c/0x180 [ 683.386298][ C1] ? kfree_skbmem+0x10c/0x180 [ 683.386302][ C1] ? __bpf_trace_kmem_free+0x6f/0x90 [ 683.386305][ C1] tipc_node_distr_xmit+0x292/0x390 [ 683.386309][ C1] ? tipc_node_xmit_skb+0x130/0x130 [ 683.386313][ C1] ? trace_tipc_sk_rej_msg+0x2c/0x6d0 [ 683.386316][ C1] tipc_sk_rcv+0x19b9/0x1ef0 [ 683.386319][ C1] ? __skb_queue_purge+0x170/0x170 [ 683.386322][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 683.386326][ C1] ? sched_clock+0x3a/0x40 [ 683.386329][ C1] ? sched_clock_cpu+0x1b/0x3d0 [ 683.386332][ C1] ? sched_clock+0x3a/0x40 [ 683.386335][ C1] tipc_node_xmit+0x256/0xcd0 [ 683.386338][ C1] ? debug_smp_processor_id+0x17/0x20 [ 683.386342][ C1] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 683.386345][ C1] ? irq_exit_rcu+0x9/0x10 [ 683.386348][ C1] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 683.386352][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 683.386355][ C1] tipc_sk_filter_rcv+0x1581/0x3850 [ 683.386358][ C1] ? tipc_sk_dump+0xfc0/0xfc0 [ 683.386362][ C1] ? memset_erms+0xb/0x10 [ 683.386365][ C1] tipc_sk_rcv+0x7cc/0x1ef0 [ 683.386368][ C1] ? __bpf_trace_kmem_free+0x6f/0x90 [ 683.386372][ C1] ? kmem_cache_free+0x2ac/0x2d0 [ 683.386375][ C1] ? __skb_queue_purge+0x170/0x170 [ 683.386379][ C1] ? tipc_sk_filter_rcv+0x3034/0x3850 [ 683.386382][ C1] tipc_node_xmit+0x256/0xcd0 [ 683.386385][ C1] ? tipc_node_get_linkname+0x1a0/0x1a0 [ 683.386389][ C1] tipc_node_distr_xmit+0x292/0x390 [ 683.386392][ C1] ? tipc_node_xmit_skb+0x130/0x130 [ 683.386396][ C1] ? __irq_exit_rcu+0x40/0x150 [ 683.386399][ C1] tipc_sk_backlog_rcv+0x16f/0x1f0 [ 683.386403][ C1] ? tipc_sk_timeout+0x970/0x970 [ 683.386406][ C1] __release_sock+0x146/0x360 [ 683.386409][ C1] sock_setsockopt+0x125e/0x2350 [ 683.386413][ C1] ? __sock_set_mark+0x160/0x160 [ 683.386417][ C1] ? selinux_socket_setsockopt+0x21c/0x300 [ 683.386420][ C1] ? selinux_socket_getsockopt+0x2e0/0x2e0 [ 683.386424][ C1] ? __fget_files+0x2c4/0x320 [ 683.386427][ C1] ? security_socket_setsockopt+0x82/0xa0 [ 683.386431][ C1] __sys_setsockopt+0x265/0x460 [ 683.386434][ C1] ? __ia32_sys_recv+0xb0/0xb0 [ 683.386438][ C1] ? irq_exit_rcu+0x9/0x10 [ 683.386442][ C1] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 683.386446][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 683.386449][ C1] __x64_sys_setsockopt+0xbf/0xd0 [ 683.386452][ C1] do_syscall_64+0x31/0x40 [ 683.386456][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 683.386459][ C1] RIP: 0033:0x7fc32d93b929 [ 683.386468][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 683.386472][ C1] RSP: 002b:00007fc32bfa4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 683.386480][ C1] RAX: ffffffffffffffda RBX: 00007fc32db62fa0 RCX: 00007fc32d93b929 [ 683.386484][ C1] RDX: 0000000000000021 RSI: 0000000000000001 RDI: 0000000000000006 [ 683.386489][ C1] RBP: 00007fc32d9bdb39 R08: 0000000000000004 R09: 0000000000000000 [ 683.386493][ C1] R10: 0000200000000540 R11: 0000000000000246 R12: 0000000000000000 [ 683.386498][ C1] R13: 0000000000000000 R14: 00007fc32db62fa0 R15: 00007ffc255d4c48