last executing test programs: 5.220065335s ago: executing program 4 (id=278): bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00'/18, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000940)=ANY=[@ANYBLOB="180000000000000000000000000d0000181100003d93dcbc1b3d82e3f3036dbc3d087ba5014d53e3cc56f27cad8d829ab5ef17d999c8a66e3f8aa15672bda02709aba8106ddb8e774e7b96b720f4f23768f2f0c478cb5840947569c727a7da0103b718609e709d35b3f15bd98a0cd45c726a2afc70f6cd6f1a67801f895f968fc05220554778f311388049ef7a87c6e99f989cf6a0b8609f", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x7, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000160001000000180095000000000000000500feff00000200950000000000000015510bf1abf0898100512397dced63225aa89c217ca929c3509ab300e56441a8ff5e12f6037102dee6dda45103"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x2, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000100850000000100000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000001100)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYBLOB="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", @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1100000004000000080000000800000010000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000807111d53634d1540000000000000005f2fac08d721f8c6aeb1c6df33c27a7", @ANYRES64=r4, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r9}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(r6, &(0x7f00000010c0)={&(0x7f0000000580)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10, 0x0}, 0xe55ba9a815aad349) ioctl$TUNSETOFFLOAD(r7, 0x40047452, 0x2000000c) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) 3.896689001s ago: executing program 4 (id=289): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000020000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000800000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x20002, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000000, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x20002, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000000, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r6, &(0x7f0000000240)={'a', ' *:* ', 'rw\x00'}, 0x9) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x18) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 3.399700553s ago: executing program 4 (id=294): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800082}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xbea7da019c167feb, 0x80000001, 0x1, 0x4, 0x4, r2, 0x93b, '\x00', 0x0, r4, 0x2, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xbea7da019c167feb, 0x80000001, 0x1, 0x4, 0x4, r2, 0x93b, '\x00', 0x0, r4, 0x2, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNSETOFFLOAD(r0, 0x40047451, 0x2000000c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x1ff) 3.184453995s ago: executing program 1 (id=296): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80720, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6f) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0x6e, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/135, 0x87}], 0x1, &(0x7f0000000500)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}, 0x0) 2.770506006s ago: executing program 2 (id=283): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) 2.682081187s ago: executing program 3 (id=230): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) ioctl$SIOCSIFHWADDR(r2, 0x8b0f, &(0x7f0000000000)={'bridge_slave_1\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x1f, &(0x7f0000000900)=@raw=[@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xe3}}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x81}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x3, 0xc, &(0x7f0000000700)=ANY=[@ANYRESDEC=r4, @ANYRESDEC=r0, @ANYRESOCT=r1], 0x0, 0x2, 0x0, 0x0, 0x100, 0x33, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x6, 0x0}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=r8, 0x36, 0x1, 0x4ff, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0}, 0x40) r11 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ac0)=ANY=[@ANYRES32=r11, @ANYRES32=r5, @ANYBLOB="3200000004000000", @ANYRES32=r9, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="bbe5fc51a72998c91aaeaa5d07d967b8b557e476491091a896c11ace900842b3d0905339b4e8a576224858d8caa7dd4a198240b817eddf838658330d74e800df7c06d882f3c9fbdcf6828297fe1f2b2a3ea3d1efc67d71acc7d4365f12bbc401782eb5d8b8e3cc59996308e4b895a47727301c3cab4390749a7d77df393bd3028e3651a82ade3a8faaf90fe9cb166dee1096a4467d881b3b030e438e20916a5488d40b46cd5c427940ef4460e4f3e2d6f3c54e56722ce1eb9c95fbd83ac70fb950bfaa5ad7d77453a9b849f3536f394217", @ANYRES64=r10], 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8}, 0x0, &(0x7f00000002c0)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r12}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r6}, &(0x7f0000000280), &(0x7f0000000300)=r5}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1a, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xfffffffffffffeef, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.566902888s ago: executing program 2 (id=283): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) 2.492496768s ago: executing program 0 (id=292): bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x4}]}, {0x0, [0x2e]}}, &(0x7f0000000200)=""/231, 0x27, 0xe7, 0x1, 0x2, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x7, 0x1, 0x7, 0x20, r0, 0x9, '\x00', r1, r2, 0x0, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x80200, 0x0) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x18, 0x13, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3c12, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0xa, 0x9, 0x5, 0x20, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0xd7, &(0x7f0000000500)=""/215, 0x0, 0x20, '\x00', r1, @fallback=0xd, r4, 0x8, &(0x7f0000000640)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xc, 0x9, 0x7fffffff}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f00000006c0), &(0x7f0000000700)=[{0x2, 0x5, 0xf, 0x9}, {0x0, 0x1, 0x2, 0xa}, {0x2, 0x4, 0x6}, {0x4, 0x5, 0x7, 0x6}, {0x5, 0x4, 0x3, 0x9}, {0x0, 0x2, 0xd}], 0x10, 0xffffffff, @void, @value}, 0x94) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000900)='btrfs_sync_fs\x00', r5, 0x0, 0x2}, 0x18) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0xf7, 0xa, 0x6, 0x7, 0x0, 0xffff, 0xc0, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x5, 0x8}, 0x2088, 0x8, 0xa79, 0x0, 0x92, 0x4, 0xfff3, 0x0, 0x330f, 0x0, 0x6}, r6, 0x1, r7, 0xe) (async) r8 = syz_clone(0x50874000, &(0x7f0000000980)="42a45f1f510c94bb2aefdce504223a429c94c0e8f41d96514c81c68563d5c958d7733c8fa424afde45d6e3178ed2078558486ed79e6efb98060fefefb26a5c2e9edafd32e812dccff4f7cf9fb49ca790a05e94", 0x53, &(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)="3920a0298fd83881631ca32e4ccdb1d963347995fe1d390a4d48b602bc1ede1c36426428d400a6e1adc683c1178fe5c64c12faac032ce67498e6b1c3b471218575b3b0a4aa8099c750c005bad06bd1de047ce3c4aa43405da6a21b132f8390242a013d65d7fcad5c244f0494446fcc5acbaa814d85ed08cb3c607cf57aebdecbd2c2cd202a0e3ff57203caf43d30688fceb07c5798f5cb28d549359c10a2dd8343423c034b9ee6b65f39b0c810af7cb557a03969bf07af6a8073b416f766e10eb9ed68c9c73c6ec531e04a4e5a25357ba128b0dcd6505f78d45e872cf14adaa70a469f5695bb893bc9d133eebd5d") ioctl$TUNGETVNETBE(r6, 0x800454df, &(0x7f0000000b80)) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000bc0), 0x113040, 0x0) (async) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)='./cgroup.net/syz0\x00', 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000c40)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x18, 0x3, &(0x7f0000000cc0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0x40}], &(0x7f0000000d00)='syzkaller\x00', 0x101, 0x2b, &(0x7f0000000d40)=""/43, 0x41100, 0xc, '\x00', r1, 0x0, r4, 0x8, &(0x7f0000000d80)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000dc0)={0x4, 0x9, 0xd5, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5b45535b, @void, @value}, 0x94) (rerun: 64) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f0000000ec0)=r13, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000012c0)={r5, 0xe0, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000001000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000001040)=[0x0], &(0x7f0000001080)=[0x0, 0x0, 0x0], 0x0, 0xb1, &(0x7f00000010c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001100), &(0x7f0000001140), 0x8, 0x5f, 0x8, 0x8, &(0x7f0000001180)}}, 0x10) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001340)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000f00)=@raw=[@ldst={0x3, 0x1, 0x0, 0x0, 0x7, 0xffffffffffffffc0, 0xffffffffffffffff}, @map_fd={0x18, 0xc, 0x1, 0x0, r3}], &(0x7f0000000f40)='syzkaller\x00', 0x8, 0x0, 0x0, 0x100, 0x43, '\x00', r1, 0x1b, r10, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x0, 0x1, 0x4, 0x2}, 0x10, r15, 0x0, 0x1, 0x0, &(0x7f0000001300)=[{0x0, 0x3, 0xd, 0x7}], 0x10, 0xfffffff8, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000001400)=r16, 0x4) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x1f, &(0x7f0000001440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @alu={0x7, 0xa1bd0c276f975e5, 0x7, 0x4, 0x6, 0x0, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x52}}, @jmp={0x5, 0x0, 0x2, 0x5, 0x9, 0x50, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001540)='syzkaller\x00', 0x865c, 0x0, 0x0, 0x40f00, 0x25, '\x00', r14, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001580)={0x5, 0xf, 0x4, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000015c0)=[r10], &(0x7f0000001600)=[{0x5, 0x2, 0x2, 0x8}], 0x10, 0x10, @void, @value}, 0x94) (async, rerun: 64) r17 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000018c0)={0x6, 0x2, &(0x7f0000001700)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000001740)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0xc, '\x00', r1, 0x25, r2, 0x8, &(0x7f0000001780)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000017c0)={0x5, 0x9, 0x7ff, 0xc5c}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001800)=[r3, r0], &(0x7f0000001840)=[{0x2, 0x3, 0xa, 0x2}, {0x3, 0x4, 0x7}, {0x3, 0x1, 0xc, 0x1}, {0x5, 0x1, 0x6, 0x3}, {0x1, 0x5, 0x1, 0x3}, {0x2, 0x2, 0xc, 0xc}, {0x3, 0x1, 0x7, 0xa}], 0x10, 0x6, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000001980)=r17, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a40)={r3, 0x58, &(0x7f00000019c0)}, 0x10) perf_event_open(&(0x7f0000001a80)={0x2, 0x80, 0x4, 0x55, 0x36, 0x5, 0x0, 0x6, 0x4, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x1, @perf_config_ext={0x4, 0xffffffffffff14d3}, 0x4109, 0x6, 0x1, 0x8, 0x50000000, 0x8, 0x4, 0x0, 0x7fffffff, 0x0, 0x5}, r8, 0xd, r7, 0x1) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r17) (async) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x5) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001b40)={[{0x2b, 'io'}, {0x2b, 'pids'}, {0x2b, 'cpuacct'}]}, 0x13) (rerun: 32) 2.492259108s ago: executing program 3 (id=230): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) ioctl$SIOCSIFHWADDR(r2, 0x8b0f, &(0x7f0000000000)={'bridge_slave_1\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x1f, &(0x7f0000000900)=@raw=[@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xe3}}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x81}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x3, 0xc, &(0x7f0000000700)=ANY=[@ANYRESDEC=r4, @ANYRESDEC=r0, @ANYRESOCT=r1], 0x0, 0x2, 0x0, 0x0, 0x100, 0x33, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x6, 0x0}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=r8, 0x36, 0x1, 0x4ff, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0}, 0x40) r11 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ac0)=ANY=[@ANYRES32=r11, @ANYRES32=r5, @ANYBLOB="3200000004000000", @ANYRES32=r9, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="bbe5fc51a72998c91aaeaa5d07d967b8b557e476491091a896c11ace900842b3d0905339b4e8a576224858d8caa7dd4a198240b817eddf838658330d74e800df7c06d882f3c9fbdcf6828297fe1f2b2a3ea3d1efc67d71acc7d4365f12bbc401782eb5d8b8e3cc59996308e4b895a47727301c3cab4390749a7d77df393bd3028e3651a82ade3a8faaf90fe9cb166dee1096a4467d881b3b030e438e20916a5488d40b46cd5c427940ef4460e4f3e2d6f3c54e56722ce1eb9c95fbd83ac70fb950bfaa5ad7d77453a9b849f3536f394217", @ANYRES64=r10], 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8}, 0x0, &(0x7f00000002c0)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r12}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r6}, &(0x7f0000000280), &(0x7f0000000300)=r5}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1a, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xfffffffffffffeef, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.387953638s ago: executing program 4 (id=297): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071121000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async, rerun: 64) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r2) (async, rerun: 32) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000007c0)='ns/pid_for_children\x00') (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000080000004e00000000000000850000007d00000095000000000000007ab9e683b171b4b09980af6c1ebeda4ac0d3e3aa71a9ab17e14e1b0be949499ca6a5b2c467b6d3d1c0ae1e9820331afd90cc832c761aa3adf9be48c401c7f893694bf8cd19b7173cd4688904f7310af046fd490d3f2cf49b5f68aecf0bc659dc3d53c2"], &(0x7f0000000140)='GPL\x00', 0x0, 0xbd, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000440)={r3, 0x0, 0x11, 0x0, &(0x7f0000000600)="61df712bc884fef053a7a9a26e9b722780", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x300, @void, @value}, 0x80) 2.385459928s ago: executing program 2 (id=283): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) 2.325721439s ago: executing program 3 (id=230): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) ioctl$SIOCSIFHWADDR(r2, 0x8b0f, &(0x7f0000000000)={'bridge_slave_1\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x1f, &(0x7f0000000900)=@raw=[@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xe3}}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x81}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x3, 0xc, &(0x7f0000000700)=ANY=[@ANYRESDEC=r4, @ANYRESDEC=r0, @ANYRESOCT=r1], 0x0, 0x2, 0x0, 0x0, 0x100, 0x33, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x6, 0x0}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=r8, 0x36, 0x1, 0x4ff, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0}, 0x40) r11 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ac0)=ANY=[@ANYRES32=r11, @ANYRES32=r5, @ANYBLOB="3200000004000000", @ANYRES32=r9, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="bbe5fc51a72998c91aaeaa5d07d967b8b557e476491091a896c11ace900842b3d0905339b4e8a576224858d8caa7dd4a198240b817eddf838658330d74e800df7c06d882f3c9fbdcf6828297fe1f2b2a3ea3d1efc67d71acc7d4365f12bbc401782eb5d8b8e3cc59996308e4b895a47727301c3cab4390749a7d77df393bd3028e3651a82ade3a8faaf90fe9cb166dee1096a4467d881b3b030e438e20916a5488d40b46cd5c427940ef4460e4f3e2d6f3c54e56722ce1eb9c95fbd83ac70fb950bfaa5ad7d77453a9b849f3536f394217", @ANYRES64=r10], 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8}, 0x0, &(0x7f00000002c0)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r12}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r6}, &(0x7f0000000280), &(0x7f0000000300)=r5}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1a, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xfffffffffffffeef, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.155380959s ago: executing program 0 (id=292): bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x4}]}, {0x0, [0x2e]}}, &(0x7f0000000200)=""/231, 0x27, 0xe7, 0x1, 0x2, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x7, 0x1, 0x7, 0x20, r0, 0x9, '\x00', r1, r2, 0x0, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x80200, 0x0) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x18, 0x13, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3c12, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0xa, 0x9, 0x5, 0x20, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0xd7, &(0x7f0000000500)=""/215, 0x0, 0x20, '\x00', r1, @fallback=0xd, r4, 0x8, &(0x7f0000000640)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xc, 0x9, 0x7fffffff}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f00000006c0), &(0x7f0000000700)=[{0x2, 0x5, 0xf, 0x9}, {0x0, 0x1, 0x2, 0xa}, {0x2, 0x4, 0x6}, {0x4, 0x5, 0x7, 0x6}, {0x5, 0x4, 0x3, 0x9}, {0x0, 0x2, 0xd}], 0x10, 0xffffffff, @void, @value}, 0x94) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000900)='btrfs_sync_fs\x00', r5, 0x0, 0x2}, 0x18) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0xf7, 0xa, 0x6, 0x7, 0x0, 0xffff, 0xc0, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x5, 0x8}, 0x2088, 0x8, 0xa79, 0x0, 0x92, 0x4, 0xfff3, 0x0, 0x330f, 0x0, 0x6}, r6, 0x1, r7, 0xe) (async) r8 = syz_clone(0x50874000, &(0x7f0000000980)="42a45f1f510c94bb2aefdce504223a429c94c0e8f41d96514c81c68563d5c958d7733c8fa424afde45d6e3178ed2078558486ed79e6efb98060fefefb26a5c2e9edafd32e812dccff4f7cf9fb49ca790a05e94", 0x53, &(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)="3920a0298fd83881631ca32e4ccdb1d963347995fe1d390a4d48b602bc1ede1c36426428d400a6e1adc683c1178fe5c64c12faac032ce67498e6b1c3b471218575b3b0a4aa8099c750c005bad06bd1de047ce3c4aa43405da6a21b132f8390242a013d65d7fcad5c244f0494446fcc5acbaa814d85ed08cb3c607cf57aebdecbd2c2cd202a0e3ff57203caf43d30688fceb07c5798f5cb28d549359c10a2dd8343423c034b9ee6b65f39b0c810af7cb557a03969bf07af6a8073b416f766e10eb9ed68c9c73c6ec531e04a4e5a25357ba128b0dcd6505f78d45e872cf14adaa70a469f5695bb893bc9d133eebd5d") ioctl$TUNGETVNETBE(r6, 0x800454df, &(0x7f0000000b80)) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000bc0), 0x113040, 0x0) (async) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)='./cgroup.net/syz0\x00', 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000c40)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x18, 0x3, &(0x7f0000000cc0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0x40}], &(0x7f0000000d00)='syzkaller\x00', 0x101, 0x2b, &(0x7f0000000d40)=""/43, 0x41100, 0xc, '\x00', r1, 0x0, r4, 0x8, &(0x7f0000000d80)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000dc0)={0x4, 0x9, 0xd5, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5b45535b, @void, @value}, 0x94) (rerun: 64) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f0000000ec0)=r13, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000012c0)={r5, 0xe0, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000001000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000001040)=[0x0], &(0x7f0000001080)=[0x0, 0x0, 0x0], 0x0, 0xb1, &(0x7f00000010c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001100), &(0x7f0000001140), 0x8, 0x5f, 0x8, 0x8, &(0x7f0000001180)}}, 0x10) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001340)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000f00)=@raw=[@ldst={0x3, 0x1, 0x0, 0x0, 0x7, 0xffffffffffffffc0, 0xffffffffffffffff}, @map_fd={0x18, 0xc, 0x1, 0x0, r3}], &(0x7f0000000f40)='syzkaller\x00', 0x8, 0x0, 0x0, 0x100, 0x43, '\x00', r1, 0x1b, r10, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x0, 0x1, 0x4, 0x2}, 0x10, r15, 0x0, 0x1, 0x0, &(0x7f0000001300)=[{0x0, 0x3, 0xd, 0x7}], 0x10, 0xfffffff8, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000001400)=r16, 0x4) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x1f, &(0x7f0000001440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @alu={0x7, 0xa1bd0c276f975e5, 0x7, 0x4, 0x6, 0x0, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x52}}, @jmp={0x5, 0x0, 0x2, 0x5, 0x9, 0x50, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001540)='syzkaller\x00', 0x865c, 0x0, 0x0, 0x40f00, 0x25, '\x00', r14, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001580)={0x5, 0xf, 0x4, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000015c0)=[r10], &(0x7f0000001600)=[{0x5, 0x2, 0x2, 0x8}], 0x10, 0x10, @void, @value}, 0x94) (async, rerun: 64) r17 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000018c0)={0x6, 0x2, &(0x7f0000001700)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000001740)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0xc, '\x00', r1, 0x25, r2, 0x8, &(0x7f0000001780)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000017c0)={0x5, 0x9, 0x7ff, 0xc5c}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001800)=[r3, r0], &(0x7f0000001840)=[{0x2, 0x3, 0xa, 0x2}, {0x3, 0x4, 0x7}, {0x3, 0x1, 0xc, 0x1}, {0x5, 0x1, 0x6, 0x3}, {0x1, 0x5, 0x1, 0x3}, {0x2, 0x2, 0xc, 0xc}, {0x3, 0x1, 0x7, 0xa}], 0x10, 0x6, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000001980)=r17, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a40)={r3, 0x58, &(0x7f00000019c0)}, 0x10) perf_event_open(&(0x7f0000001a80)={0x2, 0x80, 0x4, 0x55, 0x36, 0x5, 0x0, 0x6, 0x4, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x1, @perf_config_ext={0x4, 0xffffffffffff14d3}, 0x4109, 0x6, 0x1, 0x8, 0x50000000, 0x8, 0x4, 0x0, 0x7fffffff, 0x0, 0x5}, r8, 0xd, r7, 0x1) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r17) (async) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x5) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001b40)={[{0x2b, 'io'}, {0x2b, 'pids'}, {0x2b, 'cpuacct'}]}, 0x13) (rerun: 32) 2.05532578s ago: executing program 1 (id=298): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000060000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095000087ca000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000380), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000001740)=ANY=[], &(0x7f0000000300)=""/4082, 0x4d, 0xff2, 0x3, 0x10000, 0x0, @void, @value}, 0x28) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x3, 0x80, 0x4, 0x0, 0x0, 0x4, 0x0, 0x200, 0x5a040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x9}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="1e000000070000004c0f00000800000000000000", @ANYRESDEC=r5, @ANYBLOB='F\x00'/20, @ANYBLOB="030000c5c9030000000d00000100ffebb33adcea51218d580ef8fc630000000000000000000000000000c9754bb976b217b8b5e81fca1e75f60957002b3c382a"], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a2, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r7}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r8}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000400)='signal_generate\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.05469025s ago: executing program 2 (id=283): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) 1.883104041s ago: executing program 0 (id=292): bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x4}]}, {0x0, [0x2e]}}, &(0x7f0000000200)=""/231, 0x27, 0xe7, 0x1, 0x2, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x7, 0x1, 0x7, 0x20, r0, 0x9, '\x00', r1, r2, 0x0, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x80200, 0x0) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x18, 0x13, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3c12, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0xa, 0x9, 0x5, 0x20, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0xd7, &(0x7f0000000500)=""/215, 0x0, 0x20, '\x00', r1, @fallback=0xd, r4, 0x8, &(0x7f0000000640)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xc, 0x9, 0x7fffffff}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f00000006c0), &(0x7f0000000700)=[{0x2, 0x5, 0xf, 0x9}, {0x0, 0x1, 0x2, 0xa}, {0x2, 0x4, 0x6}, {0x4, 0x5, 0x7, 0x6}, {0x5, 0x4, 0x3, 0x9}, {0x0, 0x2, 0xd}], 0x10, 0xffffffff, @void, @value}, 0x94) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000900)='btrfs_sync_fs\x00', r5, 0x0, 0x2}, 0x18) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0xf7, 0xa, 0x6, 0x7, 0x0, 0xffff, 0xc0, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x5, 0x8}, 0x2088, 0x8, 0xa79, 0x0, 0x92, 0x4, 0xfff3, 0x0, 0x330f, 0x0, 0x6}, r6, 0x1, r7, 0xe) (async) r8 = syz_clone(0x50874000, &(0x7f0000000980)="42a45f1f510c94bb2aefdce504223a429c94c0e8f41d96514c81c68563d5c958d7733c8fa424afde45d6e3178ed2078558486ed79e6efb98060fefefb26a5c2e9edafd32e812dccff4f7cf9fb49ca790a05e94", 0x53, &(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)="3920a0298fd83881631ca32e4ccdb1d963347995fe1d390a4d48b602bc1ede1c36426428d400a6e1adc683c1178fe5c64c12faac032ce67498e6b1c3b471218575b3b0a4aa8099c750c005bad06bd1de047ce3c4aa43405da6a21b132f8390242a013d65d7fcad5c244f0494446fcc5acbaa814d85ed08cb3c607cf57aebdecbd2c2cd202a0e3ff57203caf43d30688fceb07c5798f5cb28d549359c10a2dd8343423c034b9ee6b65f39b0c810af7cb557a03969bf07af6a8073b416f766e10eb9ed68c9c73c6ec531e04a4e5a25357ba128b0dcd6505f78d45e872cf14adaa70a469f5695bb893bc9d133eebd5d") ioctl$TUNGETVNETBE(r6, 0x800454df, &(0x7f0000000b80)) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000bc0), 0x113040, 0x0) (async) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)='./cgroup.net/syz0\x00', 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000c40)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x18, 0x3, &(0x7f0000000cc0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0x40}], &(0x7f0000000d00)='syzkaller\x00', 0x101, 0x2b, &(0x7f0000000d40)=""/43, 0x41100, 0xc, '\x00', r1, 0x0, r4, 0x8, &(0x7f0000000d80)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000dc0)={0x4, 0x9, 0xd5, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5b45535b, @void, @value}, 0x94) (rerun: 64) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f0000000ec0)=r13, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000012c0)={r5, 0xe0, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000001000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000001040)=[0x0], &(0x7f0000001080)=[0x0, 0x0, 0x0], 0x0, 0xb1, &(0x7f00000010c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001100), &(0x7f0000001140), 0x8, 0x5f, 0x8, 0x8, &(0x7f0000001180)}}, 0x10) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001340)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000f00)=@raw=[@ldst={0x3, 0x1, 0x0, 0x0, 0x7, 0xffffffffffffffc0, 0xffffffffffffffff}, @map_fd={0x18, 0xc, 0x1, 0x0, r3}], &(0x7f0000000f40)='syzkaller\x00', 0x8, 0x0, 0x0, 0x100, 0x43, '\x00', r1, 0x1b, r10, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x0, 0x1, 0x4, 0x2}, 0x10, r15, 0x0, 0x1, 0x0, &(0x7f0000001300)=[{0x0, 0x3, 0xd, 0x7}], 0x10, 0xfffffff8, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000001400)=r16, 0x4) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x1f, &(0x7f0000001440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @alu={0x7, 0xa1bd0c276f975e5, 0x7, 0x4, 0x6, 0x0, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x52}}, @jmp={0x5, 0x0, 0x2, 0x5, 0x9, 0x50, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001540)='syzkaller\x00', 0x865c, 0x0, 0x0, 0x40f00, 0x25, '\x00', r14, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001580)={0x5, 0xf, 0x4, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000015c0)=[r10], &(0x7f0000001600)=[{0x5, 0x2, 0x2, 0x8}], 0x10, 0x10, @void, @value}, 0x94) (async, rerun: 64) r17 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000018c0)={0x6, 0x2, &(0x7f0000001700)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000001740)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0xc, '\x00', r1, 0x25, r2, 0x8, &(0x7f0000001780)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000017c0)={0x5, 0x9, 0x7ff, 0xc5c}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001800)=[r3, r0], &(0x7f0000001840)=[{0x2, 0x3, 0xa, 0x2}, {0x3, 0x4, 0x7}, {0x3, 0x1, 0xc, 0x1}, {0x5, 0x1, 0x6, 0x3}, {0x1, 0x5, 0x1, 0x3}, {0x2, 0x2, 0xc, 0xc}, {0x3, 0x1, 0x7, 0xa}], 0x10, 0x6, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000001980)=r17, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a40)={r3, 0x58, &(0x7f00000019c0)}, 0x10) perf_event_open(&(0x7f0000001a80)={0x2, 0x80, 0x4, 0x55, 0x36, 0x5, 0x0, 0x6, 0x4, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x1, @perf_config_ext={0x4, 0xffffffffffff14d3}, 0x4109, 0x6, 0x1, 0x8, 0x50000000, 0x8, 0x4, 0x0, 0x7fffffff, 0x0, 0x5}, r8, 0xd, r7, 0x1) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r17) (async) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x5) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001b40)={[{0x2b, 'io'}, {0x2b, 'pids'}, {0x2b, 'cpuacct'}]}, 0x13) (rerun: 32) 1.748737922s ago: executing program 3 (id=230): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) ioctl$SIOCSIFHWADDR(r2, 0x8b0f, &(0x7f0000000000)={'bridge_slave_1\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x1f, &(0x7f0000000900)=@raw=[@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xe3}}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x81}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x3, 0xc, &(0x7f0000000700)=ANY=[@ANYRESDEC=r4, @ANYRESDEC=r0, @ANYRESOCT=r1], 0x0, 0x2, 0x0, 0x0, 0x100, 0x33, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x6, 0x0}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=r8, 0x36, 0x1, 0x4ff, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0}, 0x40) r11 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ac0)=ANY=[@ANYRES32=r11, @ANYRES32=r5, @ANYBLOB="3200000004000000", @ANYRES32=r9, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="bbe5fc51a72998c91aaeaa5d07d967b8b557e476491091a896c11ace900842b3d0905339b4e8a576224858d8caa7dd4a198240b817eddf838658330d74e800df7c06d882f3c9fbdcf6828297fe1f2b2a3ea3d1efc67d71acc7d4365f12bbc401782eb5d8b8e3cc59996308e4b895a47727301c3cab4390749a7d77df393bd3028e3651a82ade3a8faaf90fe9cb166dee1096a4467d881b3b030e438e20916a5488d40b46cd5c427940ef4460e4f3e2d6f3c54e56722ce1eb9c95fbd83ac70fb950bfaa5ad7d77453a9b849f3536f394217", @ANYRES64=r10], 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8}, 0x0, &(0x7f00000002c0)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r12}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r6}, &(0x7f0000000280), &(0x7f0000000300)=r5}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1a, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xfffffffffffffeef, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.669754042s ago: executing program 4 (id=299): r0 = bpf$TOKEN_CREATE(0x24, &(0x7f00000008c0), 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYRES16=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f00000005c0)}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x400000000000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000140)='blkio.bfq.io_serviced\x00', 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000002000000000000000080008500000041000000850000002a0000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f", @ANYRES32, @ANYBLOB="000400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) 1.668522801s ago: executing program 0 (id=292): bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x4}]}, {0x0, [0x2e]}}, &(0x7f0000000200)=""/231, 0x27, 0xe7, 0x1, 0x2, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x7, 0x1, 0x7, 0x20, r0, 0x9, '\x00', r1, r2, 0x0, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x80200, 0x0) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x18, 0x13, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3c12, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0xa, 0x9, 0x5, 0x20, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0xd7, &(0x7f0000000500)=""/215, 0x0, 0x20, '\x00', r1, @fallback=0xd, r4, 0x8, &(0x7f0000000640)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xc, 0x9, 0x7fffffff}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f00000006c0), &(0x7f0000000700)=[{0x2, 0x5, 0xf, 0x9}, {0x0, 0x1, 0x2, 0xa}, {0x2, 0x4, 0x6}, {0x4, 0x5, 0x7, 0x6}, {0x5, 0x4, 0x3, 0x9}, {0x0, 0x2, 0xd}], 0x10, 0xffffffff, @void, @value}, 0x94) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000900)='btrfs_sync_fs\x00', r5, 0x0, 0x2}, 0x18) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0xf7, 0xa, 0x6, 0x7, 0x0, 0xffff, 0xc0, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x5, 0x8}, 0x2088, 0x8, 0xa79, 0x0, 0x92, 0x4, 0xfff3, 0x0, 0x330f, 0x0, 0x6}, r6, 0x1, r7, 0xe) (async) r8 = syz_clone(0x50874000, &(0x7f0000000980)="42a45f1f510c94bb2aefdce504223a429c94c0e8f41d96514c81c68563d5c958d7733c8fa424afde45d6e3178ed2078558486ed79e6efb98060fefefb26a5c2e9edafd32e812dccff4f7cf9fb49ca790a05e94", 0x53, &(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)="3920a0298fd83881631ca32e4ccdb1d963347995fe1d390a4d48b602bc1ede1c36426428d400a6e1adc683c1178fe5c64c12faac032ce67498e6b1c3b471218575b3b0a4aa8099c750c005bad06bd1de047ce3c4aa43405da6a21b132f8390242a013d65d7fcad5c244f0494446fcc5acbaa814d85ed08cb3c607cf57aebdecbd2c2cd202a0e3ff57203caf43d30688fceb07c5798f5cb28d549359c10a2dd8343423c034b9ee6b65f39b0c810af7cb557a03969bf07af6a8073b416f766e10eb9ed68c9c73c6ec531e04a4e5a25357ba128b0dcd6505f78d45e872cf14adaa70a469f5695bb893bc9d133eebd5d") ioctl$TUNGETVNETBE(r6, 0x800454df, &(0x7f0000000b80)) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000bc0), 0x113040, 0x0) (async) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)='./cgroup.net/syz0\x00', 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000c40)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x18, 0x3, &(0x7f0000000cc0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0x40}], &(0x7f0000000d00)='syzkaller\x00', 0x101, 0x2b, &(0x7f0000000d40)=""/43, 0x41100, 0xc, '\x00', r1, 0x0, r4, 0x8, &(0x7f0000000d80)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000dc0)={0x4, 0x9, 0xd5, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5b45535b, @void, @value}, 0x94) (rerun: 64) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f0000000ec0)=r13, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000012c0)={r5, 0xe0, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000001000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000001040)=[0x0], &(0x7f0000001080)=[0x0, 0x0, 0x0], 0x0, 0xb1, &(0x7f00000010c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001100), &(0x7f0000001140), 0x8, 0x5f, 0x8, 0x8, &(0x7f0000001180)}}, 0x10) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001340)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000f00)=@raw=[@ldst={0x3, 0x1, 0x0, 0x0, 0x7, 0xffffffffffffffc0, 0xffffffffffffffff}, @map_fd={0x18, 0xc, 0x1, 0x0, r3}], &(0x7f0000000f40)='syzkaller\x00', 0x8, 0x0, 0x0, 0x100, 0x43, '\x00', r1, 0x1b, r10, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x0, 0x1, 0x4, 0x2}, 0x10, r15, 0x0, 0x1, 0x0, &(0x7f0000001300)=[{0x0, 0x3, 0xd, 0x7}], 0x10, 0xfffffff8, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000001400)=r16, 0x4) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x1f, &(0x7f0000001440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @alu={0x7, 0xa1bd0c276f975e5, 0x7, 0x4, 0x6, 0x0, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x52}}, @jmp={0x5, 0x0, 0x2, 0x5, 0x9, 0x50, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001540)='syzkaller\x00', 0x865c, 0x0, 0x0, 0x40f00, 0x25, '\x00', r14, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001580)={0x5, 0xf, 0x4, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000015c0)=[r10], &(0x7f0000001600)=[{0x5, 0x2, 0x2, 0x8}], 0x10, 0x10, @void, @value}, 0x94) (async, rerun: 64) r17 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000018c0)={0x6, 0x2, &(0x7f0000001700)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000001740)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0xc, '\x00', r1, 0x25, r2, 0x8, &(0x7f0000001780)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000017c0)={0x5, 0x9, 0x7ff, 0xc5c}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001800)=[r3, r0], &(0x7f0000001840)=[{0x2, 0x3, 0xa, 0x2}, {0x3, 0x4, 0x7}, {0x3, 0x1, 0xc, 0x1}, {0x5, 0x1, 0x6, 0x3}, {0x1, 0x5, 0x1, 0x3}, {0x2, 0x2, 0xc, 0xc}, {0x3, 0x1, 0x7, 0xa}], 0x10, 0x6, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000001980)=r17, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a40)={r3, 0x58, &(0x7f00000019c0)}, 0x10) perf_event_open(&(0x7f0000001a80)={0x2, 0x80, 0x4, 0x55, 0x36, 0x5, 0x0, 0x6, 0x4, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x1, @perf_config_ext={0x4, 0xffffffffffff14d3}, 0x4109, 0x6, 0x1, 0x8, 0x50000000, 0x8, 0x4, 0x0, 0x7fffffff, 0x0, 0x5}, r8, 0xd, r7, 0x1) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r17) (async) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x5) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001b40)={[{0x2b, 'io'}, {0x2b, 'pids'}, {0x2b, 'cpuacct'}]}, 0x13) (rerun: 32) 540.634657ms ago: executing program 1 (id=300): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x20000000001) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb601288745"], 0xffdd) 537.303247ms ago: executing program 2 (id=283): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) 463.578008ms ago: executing program 1 (id=301): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x80}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1807000000000000000000000000000818120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000001000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000040), 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 462.856147ms ago: executing program 3 (id=230): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) ioctl$SIOCSIFHWADDR(r2, 0x8b0f, &(0x7f0000000000)={'bridge_slave_1\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x1f, &(0x7f0000000900)=@raw=[@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xe3}}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x81}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x3, 0xc, &(0x7f0000000700)=ANY=[@ANYRESDEC=r4, @ANYRESDEC=r0, @ANYRESOCT=r1], 0x0, 0x2, 0x0, 0x0, 0x100, 0x33, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x6, 0x0}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=r8, 0x36, 0x1, 0x4ff, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0}, 0x40) r11 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ac0)=ANY=[@ANYRES32=r11, @ANYRES32=r5, @ANYBLOB="3200000004000000", @ANYRES32=r9, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="bbe5fc51a72998c91aaeaa5d07d967b8b557e476491091a896c11ace900842b3d0905339b4e8a576224858d8caa7dd4a198240b817eddf838658330d74e800df7c06d882f3c9fbdcf6828297fe1f2b2a3ea3d1efc67d71acc7d4365f12bbc401782eb5d8b8e3cc59996308e4b895a47727301c3cab4390749a7d77df393bd3028e3651a82ade3a8faaf90fe9cb166dee1096a4467d881b3b030e438e20916a5488d40b46cd5c427940ef4460e4f3e2d6f3c54e56722ce1eb9c95fbd83ac70fb950bfaa5ad7d77453a9b849f3536f394217", @ANYRES64=r10], 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8}, 0x0, &(0x7f00000002c0)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r12}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r6}, &(0x7f0000000280), &(0x7f0000000300)=r5}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1a, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xfffffffffffffeef, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 371.986308ms ago: executing program 0 (id=292): bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x4}]}, {0x0, [0x2e]}}, &(0x7f0000000200)=""/231, 0x27, 0xe7, 0x1, 0x2, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x7, 0x1, 0x7, 0x20, r0, 0x9, '\x00', r1, r2, 0x0, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x80200, 0x0) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x18, 0x13, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3c12, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0xa, 0x9, 0x5, 0x20, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0xd7, &(0x7f0000000500)=""/215, 0x0, 0x20, '\x00', r1, @fallback=0xd, r4, 0x8, &(0x7f0000000640)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xc, 0x9, 0x7fffffff}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f00000006c0), &(0x7f0000000700)=[{0x2, 0x5, 0xf, 0x9}, {0x0, 0x1, 0x2, 0xa}, {0x2, 0x4, 0x6}, {0x4, 0x5, 0x7, 0x6}, {0x5, 0x4, 0x3, 0x9}, {0x0, 0x2, 0xd}], 0x10, 0xffffffff, @void, @value}, 0x94) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000900)='btrfs_sync_fs\x00', r5, 0x0, 0x2}, 0x18) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0xf7, 0xa, 0x6, 0x7, 0x0, 0xffff, 0xc0, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x5, 0x8}, 0x2088, 0x8, 0xa79, 0x0, 0x92, 0x4, 0xfff3, 0x0, 0x330f, 0x0, 0x6}, r6, 0x1, r7, 0xe) (async) r8 = syz_clone(0x50874000, &(0x7f0000000980)="42a45f1f510c94bb2aefdce504223a429c94c0e8f41d96514c81c68563d5c958d7733c8fa424afde45d6e3178ed2078558486ed79e6efb98060fefefb26a5c2e9edafd32e812dccff4f7cf9fb49ca790a05e94", 0x53, &(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)="3920a0298fd83881631ca32e4ccdb1d963347995fe1d390a4d48b602bc1ede1c36426428d400a6e1adc683c1178fe5c64c12faac032ce67498e6b1c3b471218575b3b0a4aa8099c750c005bad06bd1de047ce3c4aa43405da6a21b132f8390242a013d65d7fcad5c244f0494446fcc5acbaa814d85ed08cb3c607cf57aebdecbd2c2cd202a0e3ff57203caf43d30688fceb07c5798f5cb28d549359c10a2dd8343423c034b9ee6b65f39b0c810af7cb557a03969bf07af6a8073b416f766e10eb9ed68c9c73c6ec531e04a4e5a25357ba128b0dcd6505f78d45e872cf14adaa70a469f5695bb893bc9d133eebd5d") ioctl$TUNGETVNETBE(r6, 0x800454df, &(0x7f0000000b80)) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000bc0), 0x113040, 0x0) (async) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)='./cgroup.net/syz0\x00', 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000c40)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x18, 0x3, &(0x7f0000000cc0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0x40}], &(0x7f0000000d00)='syzkaller\x00', 0x101, 0x2b, &(0x7f0000000d40)=""/43, 0x41100, 0xc, '\x00', r1, 0x0, r4, 0x8, &(0x7f0000000d80)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000dc0)={0x4, 0x9, 0xd5, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5b45535b, @void, @value}, 0x94) (rerun: 64) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f0000000ec0)=r13, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000012c0)={r5, 0xe0, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000001000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000001040)=[0x0], &(0x7f0000001080)=[0x0, 0x0, 0x0], 0x0, 0xb1, &(0x7f00000010c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001100), &(0x7f0000001140), 0x8, 0x5f, 0x8, 0x8, &(0x7f0000001180)}}, 0x10) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001340)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000f00)=@raw=[@ldst={0x3, 0x1, 0x0, 0x0, 0x7, 0xffffffffffffffc0, 0xffffffffffffffff}, @map_fd={0x18, 0xc, 0x1, 0x0, r3}], &(0x7f0000000f40)='syzkaller\x00', 0x8, 0x0, 0x0, 0x100, 0x43, '\x00', r1, 0x1b, r10, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x0, 0x1, 0x4, 0x2}, 0x10, r15, 0x0, 0x1, 0x0, &(0x7f0000001300)=[{0x0, 0x3, 0xd, 0x7}], 0x10, 0xfffffff8, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000001400)=r16, 0x4) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x1f, &(0x7f0000001440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @alu={0x7, 0xa1bd0c276f975e5, 0x7, 0x4, 0x6, 0x0, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x52}}, @jmp={0x5, 0x0, 0x2, 0x5, 0x9, 0x50, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001540)='syzkaller\x00', 0x865c, 0x0, 0x0, 0x40f00, 0x25, '\x00', r14, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001580)={0x5, 0xf, 0x4, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000015c0)=[r10], &(0x7f0000001600)=[{0x5, 0x2, 0x2, 0x8}], 0x10, 0x10, @void, @value}, 0x94) (async, rerun: 64) r17 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000018c0)={0x6, 0x2, &(0x7f0000001700)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000001740)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0xc, '\x00', r1, 0x25, r2, 0x8, &(0x7f0000001780)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000017c0)={0x5, 0x9, 0x7ff, 0xc5c}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001800)=[r3, r0], &(0x7f0000001840)=[{0x2, 0x3, 0xa, 0x2}, {0x3, 0x4, 0x7}, {0x3, 0x1, 0xc, 0x1}, {0x5, 0x1, 0x6, 0x3}, {0x1, 0x5, 0x1, 0x3}, {0x2, 0x2, 0xc, 0xc}, {0x3, 0x1, 0x7, 0xa}], 0x10, 0x6, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000001980)=r17, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a40)={r3, 0x58, &(0x7f00000019c0)}, 0x10) perf_event_open(&(0x7f0000001a80)={0x2, 0x80, 0x4, 0x55, 0x36, 0x5, 0x0, 0x6, 0x4, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x1, @perf_config_ext={0x4, 0xffffffffffff14d3}, 0x4109, 0x6, 0x1, 0x8, 0x50000000, 0x8, 0x4, 0x0, 0x7fffffff, 0x0, 0x5}, r8, 0xd, r7, 0x1) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r17) (async) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x5) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001b40)={[{0x2b, 'io'}, {0x2b, 'pids'}, {0x2b, 'cpuacct'}]}, 0x13) (rerun: 32) 329.160538ms ago: executing program 1 (id=302): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0xb5}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @exit, @exit, @ringbuf_query, @alu={0x0, 0x0, 0x0, 0x0, 0x4, 0x10, 0xfffffffffffffff0}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x37) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r1}, 0x57) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000300b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000400)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18040000000000000000000000400000850000000800000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r5}, 0x18) bpf$ENABLE_STATS(0x20, &(0x7f0000000180), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111b5000000000085100000020000008500000005000000950000000000000095008500"], &(0x7f0000000080)='GPL\x00', 0x5, 0xbf, &(0x7f000000cf3d)=""/191, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 328.355758ms ago: executing program 2 (id=283): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) 147.509869ms ago: executing program 4 (id=303): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xe82, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xc, 0x4, 0x4, 0xbc3, 0x41015, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) 145.659139ms ago: executing program 0 (id=292): bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x4}]}, {0x0, [0x2e]}}, &(0x7f0000000200)=""/231, 0x27, 0xe7, 0x1, 0x2, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x7, 0x1, 0x7, 0x20, r0, 0x9, '\x00', r1, r2, 0x0, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x80200, 0x0) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x18, 0x13, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3c12, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0xa, 0x9, 0x5, 0x20, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0xd7, &(0x7f0000000500)=""/215, 0x0, 0x20, '\x00', r1, @fallback=0xd, r4, 0x8, &(0x7f0000000640)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0xc, 0x9, 0x7fffffff}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f00000006c0), &(0x7f0000000700)=[{0x2, 0x5, 0xf, 0x9}, {0x0, 0x1, 0x2, 0xa}, {0x2, 0x4, 0x6}, {0x4, 0x5, 0x7, 0x6}, {0x5, 0x4, 0x3, 0x9}, {0x0, 0x2, 0xd}], 0x10, 0xffffffff, @void, @value}, 0x94) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000900)='btrfs_sync_fs\x00', r5, 0x0, 0x2}, 0x18) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0xf7, 0xa, 0x6, 0x7, 0x0, 0xffff, 0xc0, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x5, 0x8}, 0x2088, 0x8, 0xa79, 0x0, 0x92, 0x4, 0xfff3, 0x0, 0x330f, 0x0, 0x6}, r6, 0x1, r7, 0xe) (async) r8 = syz_clone(0x50874000, &(0x7f0000000980)="42a45f1f510c94bb2aefdce504223a429c94c0e8f41d96514c81c68563d5c958d7733c8fa424afde45d6e3178ed2078558486ed79e6efb98060fefefb26a5c2e9edafd32e812dccff4f7cf9fb49ca790a05e94", 0x53, &(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)="3920a0298fd83881631ca32e4ccdb1d963347995fe1d390a4d48b602bc1ede1c36426428d400a6e1adc683c1178fe5c64c12faac032ce67498e6b1c3b471218575b3b0a4aa8099c750c005bad06bd1de047ce3c4aa43405da6a21b132f8390242a013d65d7fcad5c244f0494446fcc5acbaa814d85ed08cb3c607cf57aebdecbd2c2cd202a0e3ff57203caf43d30688fceb07c5798f5cb28d549359c10a2dd8343423c034b9ee6b65f39b0c810af7cb557a03969bf07af6a8073b416f766e10eb9ed68c9c73c6ec531e04a4e5a25357ba128b0dcd6505f78d45e872cf14adaa70a469f5695bb893bc9d133eebd5d") ioctl$TUNGETVNETBE(r6, 0x800454df, &(0x7f0000000b80)) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000bc0), 0x113040, 0x0) (async) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)='./cgroup.net/syz0\x00', 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000c40)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x18, 0x3, &(0x7f0000000cc0)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0x9, 0x8, 0x4, 0x40}], &(0x7f0000000d00)='syzkaller\x00', 0x101, 0x2b, &(0x7f0000000d40)=""/43, 0x41100, 0xc, '\x00', r1, 0x0, r4, 0x8, &(0x7f0000000d80)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000dc0)={0x4, 0x9, 0xd5, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5b45535b, @void, @value}, 0x94) (rerun: 64) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f0000000ec0)=r13, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000012c0)={r5, 0xe0, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000001000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000001040)=[0x0], &(0x7f0000001080)=[0x0, 0x0, 0x0], 0x0, 0xb1, &(0x7f00000010c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001100), &(0x7f0000001140), 0x8, 0x5f, 0x8, 0x8, &(0x7f0000001180)}}, 0x10) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001340)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000f00)=@raw=[@ldst={0x3, 0x1, 0x0, 0x0, 0x7, 0xffffffffffffffc0, 0xffffffffffffffff}, @map_fd={0x18, 0xc, 0x1, 0x0, r3}], &(0x7f0000000f40)='syzkaller\x00', 0x8, 0x0, 0x0, 0x100, 0x43, '\x00', r1, 0x1b, r10, 0x8, &(0x7f0000000f80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000fc0)={0x0, 0x1, 0x4, 0x2}, 0x10, r15, 0x0, 0x1, 0x0, &(0x7f0000001300)=[{0x0, 0x3, 0xd, 0x7}], 0x10, 0xfffffff8, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000001400)=r16, 0x4) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x1f, &(0x7f0000001440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0xfff}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @alu={0x7, 0xa1bd0c276f975e5, 0x7, 0x4, 0x6, 0x0, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x52}}, @jmp={0x5, 0x0, 0x2, 0x5, 0x9, 0x50, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001540)='syzkaller\x00', 0x865c, 0x0, 0x0, 0x40f00, 0x25, '\x00', r14, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001580)={0x5, 0xf, 0x4, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000015c0)=[r10], &(0x7f0000001600)=[{0x5, 0x2, 0x2, 0x8}], 0x10, 0x10, @void, @value}, 0x94) (async, rerun: 64) r17 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000018c0)={0x6, 0x2, &(0x7f0000001700)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000001740)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0xc, '\x00', r1, 0x25, r2, 0x8, &(0x7f0000001780)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000017c0)={0x5, 0x9, 0x7ff, 0xc5c}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001800)=[r3, r0], &(0x7f0000001840)=[{0x2, 0x3, 0xa, 0x2}, {0x3, 0x4, 0x7}, {0x3, 0x1, 0xc, 0x1}, {0x5, 0x1, 0x6, 0x3}, {0x1, 0x5, 0x1, 0x3}, {0x2, 0x2, 0xc, 0xc}, {0x3, 0x1, 0x7, 0xa}], 0x10, 0x6, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000001980)=r17, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a40)={r3, 0x58, &(0x7f00000019c0)}, 0x10) perf_event_open(&(0x7f0000001a80)={0x2, 0x80, 0x4, 0x55, 0x36, 0x5, 0x0, 0x6, 0x4, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x1, @perf_config_ext={0x4, 0xffffffffffff14d3}, 0x4109, 0x6, 0x1, 0x8, 0x50000000, 0x8, 0x4, 0x0, 0x7fffffff, 0x0, 0x5}, r8, 0xd, r7, 0x1) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r17) (async) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x5) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001b40)={[{0x2b, 'io'}, {0x2b, 'pids'}, {0x2b, 'cpuacct'}]}, 0x13) (rerun: 32) 2.29568ms ago: executing program 1 (id=304): openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000547c861c00080000000000000100000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000004cadf1fe416a47700000000000000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000000000000100000f01000000020000000000000000000000de000000000000000f03000000868a1800005f5f00"], &(0x7f0000000100)=""/129, 0x45, 0x81, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=@framed={{}, [@map_idx_val, @tail_call, @printk={@d}, @initr0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000000)='ext4_fc_track_range\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpuacct.usage_sys\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x2, 0x80, 0xc2, 0x5}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000182000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYRES32, @ANYRESHEX=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595350b4fb90ff598"], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="4fb265b75a430e08000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) 0s ago: executing program 3 (id=230): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) ioctl$SIOCSIFHWADDR(r2, 0x8b0f, &(0x7f0000000000)={'bridge_slave_1\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x1f, &(0x7f0000000900)=@raw=[@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xe3}}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x81}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x3, 0xc, &(0x7f0000000700)=ANY=[@ANYRESDEC=r4, @ANYRESDEC=r0, @ANYRESOCT=r1], 0x0, 0x2, 0x0, 0x0, 0x100, 0x33, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x6, 0x0}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=r8, 0x36, 0x1, 0x4ff, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0}, 0x40) r11 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ac0)=ANY=[@ANYRES32=r11, @ANYRES32=r5, @ANYBLOB="3200000004000000", @ANYRES32=r9, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="bbe5fc51a72998c91aaeaa5d07d967b8b557e476491091a896c11ace900842b3d0905339b4e8a576224858d8caa7dd4a198240b817eddf838658330d74e800df7c06d882f3c9fbdcf6828297fe1f2b2a3ea3d1efc67d71acc7d4365f12bbc401782eb5d8b8e3cc59996308e4b895a47727301c3cab4390749a7d77df393bd3028e3651a82ade3a8faaf90fe9cb166dee1096a4467d881b3b030e438e20916a5488d40b46cd5c427940ef4460e4f3e2d6f3c54e56722ce1eb9c95fbd83ac70fb950bfaa5ad7d77453a9b849f3536f394217", @ANYRES64=r10], 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8}, 0x0, &(0x7f00000002c0)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r12}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r6}, &(0x7f0000000280), &(0x7f0000000300)=r5}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1a, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xfffffffffffffeef, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.117' (ED25519) to the list of known hosts. [ 21.553006][ T30] audit: type=1400 audit(1732770304.415:66): avc: denied { integrity } for pid=279 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 21.576977][ T30] audit: type=1400 audit(1732770304.445:67): avc: denied { mounton } for pid=279 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.578375][ T279] cgroup: Unknown subsys name 'net' [ 21.599463][ T30] audit: type=1400 audit(1732770304.445:68): avc: denied { mount } for pid=279 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.626523][ T30] audit: type=1400 audit(1732770304.475:69): avc: denied { unmount } for pid=279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.626779][ T279] cgroup: Unknown subsys name 'devices' [ 21.768070][ T279] cgroup: Unknown subsys name 'hugetlb' [ 21.773518][ T279] cgroup: Unknown subsys name 'rlimit' [ 21.914634][ T30] audit: type=1400 audit(1732770304.775:70): avc: denied { setattr } for pid=279 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.937650][ T30] audit: type=1400 audit(1732770304.775:71): avc: denied { mounton } for pid=279 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.962138][ T30] audit: type=1400 audit(1732770304.775:72): avc: denied { mount } for pid=279 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.010583][ T283] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.019324][ T30] audit: type=1400 audit(1732770304.895:73): avc: denied { relabelto } for pid=283 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.041512][ T279] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.044801][ T30] audit: type=1400 audit(1732770304.895:74): avc: denied { write } for pid=283 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.078501][ T30] audit: type=1400 audit(1732770304.915:75): avc: denied { read } for pid=279 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.611556][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.618572][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.626193][ T289] device bridge_slave_0 entered promiscuous mode [ 22.633803][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.640875][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.648154][ T289] device bridge_slave_1 entered promiscuous mode [ 22.698488][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.705341][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.712727][ T290] device bridge_slave_0 entered promiscuous mode [ 22.719929][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.726957][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.734124][ T290] device bridge_slave_1 entered promiscuous mode [ 22.832402][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.839367][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.846588][ T291] device bridge_slave_0 entered promiscuous mode [ 22.854398][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.861422][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.868706][ T291] device bridge_slave_1 entered promiscuous mode [ 22.887406][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.894473][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.902020][ T292] device bridge_slave_0 entered promiscuous mode [ 22.918009][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.924857][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.932276][ T292] device bridge_slave_1 entered promiscuous mode [ 22.980442][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.987413][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.994499][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.001385][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.024142][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.031161][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.038586][ T293] device bridge_slave_0 entered promiscuous mode [ 23.055810][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.062676][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.070091][ T293] device bridge_slave_1 entered promiscuous mode [ 23.089668][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.096538][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.103631][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.110540][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.231928][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.238808][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.245916][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.252679][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.264371][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.271249][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.278361][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.285119][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.305143][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.312305][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.319408][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.327166][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.335334][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.342682][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.350051][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.357333][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.364544][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.372653][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.379922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.410209][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.418242][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.425279][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.432805][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.441314][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.448178][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.455317][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.463481][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.470337][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.484345][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.507525][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.515455][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.523396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.531360][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.539494][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.547805][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.554650][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.561952][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.569993][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.576845][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.607232][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.615219][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.623239][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.630643][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.638693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.646921][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.654851][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.661814][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.669098][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.677432][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.685362][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.692221][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.699499][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.707724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.715655][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.722533][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.729766][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.737859][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.745921][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.752756][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.760103][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.768015][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.775832][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.783653][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.791543][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.799403][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.810414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.818082][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.826387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.840069][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.848448][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.856924][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.864658][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.891414][ T289] device veth0_vlan entered promiscuous mode [ 23.899368][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.906867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.914115][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.922098][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.931300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.939815][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.948152][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.956418][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.964484][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.972418][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.980179][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.988148][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.996271][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.004131][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.012017][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.019402][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.028754][ T291] device veth0_vlan entered promiscuous mode [ 24.036211][ T290] device veth0_vlan entered promiscuous mode [ 24.043734][ T292] device veth0_vlan entered promiscuous mode [ 24.052551][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.060580][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.068586][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.076592][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.084426][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.091890][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.099259][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.106836][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.120293][ T290] device veth1_macvtap entered promiscuous mode [ 24.129026][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.137145][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.145061][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.164781][ T293] device veth0_vlan entered promiscuous mode [ 24.170885][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.179539][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.187696][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.194887][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.202730][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.211103][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.219500][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.227838][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.236092][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.247496][ T291] device veth1_macvtap entered promiscuous mode [ 24.259372][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.267941][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.276096][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.289031][ T292] device veth1_macvtap entered promiscuous mode [ 24.298723][ T289] device veth1_macvtap entered promiscuous mode [ 24.307998][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.316893][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.335437][ T293] device veth1_macvtap entered promiscuous mode [ 24.342797][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.351802][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.360093][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.368606][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.376897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.385026][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.393378][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.444194][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.456675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.465011][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.474421][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.483246][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.492375][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.500989][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.509531][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.518231][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.526669][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.575684][ C1] hrtimer: interrupt took 27691 ns [ 25.424924][ T344] device veth1_macvtap left promiscuous mode [ 25.877127][ T357] device sit0 entered promiscuous mode [ 26.612992][ T369] device syzkaller0 entered promiscuous mode [ 27.607016][ T396] device wg2 entered promiscuous mode [ 27.655577][ T398] device sit0 entered promiscuous mode [ 28.093806][ T30] kauditd_printk_skb: 43 callbacks suppressed [ 28.093823][ T30] audit: type=1400 audit(1732770310.955:119): avc: denied { create } for pid=409 comm="syz.4.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 28.204746][ T30] audit: type=1400 audit(1732770310.955:120): avc: denied { create } for pid=409 comm="syz.4.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 28.247131][ T30] audit: type=1400 audit(1732770311.095:121): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 28.300915][ T341] syz.0.1 (341) used greatest stack depth: 22192 bytes left [ 28.936381][ T423] device syzkaller0 entered promiscuous mode [ 28.995877][ T429] device syzkaller0 left promiscuous mode [ 29.508384][ T438] device sit0 left promiscuous mode [ 29.731339][ T436] device wg2 entered promiscuous mode [ 29.760592][ T443] device sit0 entered promiscuous mode [ 30.102235][ T450] device sit0 left promiscuous mode [ 30.180231][ T452] device sit0 entered promiscuous mode [ 31.241843][ T483] device sit0 entered promiscuous mode [ 31.650202][ T489] device syzkaller0 entered promiscuous mode [ 31.794437][ T488] device syzkaller0 left promiscuous mode [ 31.871617][ T493] device wg2 entered promiscuous mode [ 32.393023][ T424] syz.3.25 (424) used greatest stack depth: 22040 bytes left [ 32.486412][ T509] device sit0 left promiscuous mode [ 32.552727][ T512] device sit0 entered promiscuous mode [ 34.516891][ T559] device veth1_macvtap left promiscuous mode [ 34.782276][ T507] syz.2.48 (507) used greatest stack depth: 21920 bytes left [ 35.048727][ T577] device veth1_macvtap left promiscuous mode [ 35.237806][ T30] audit: type=1400 audit(1732770318.105:122): avc: denied { write } for pid=586 comm="syz.2.69" name="cgroup.subtree_control" dev="cgroup2" ino=200 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 35.387926][ T30] audit: type=1400 audit(1732770318.105:123): avc: denied { open } for pid=586 comm="syz.2.69" path="" dev="cgroup2" ino=200 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 35.846992][ T30] audit: type=1400 audit(1732770318.715:124): avc: denied { read } for pid=620 comm="syz.1.91" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 35.924025][ T30] audit: type=1400 audit(1732770318.715:125): avc: denied { open } for pid=620 comm="syz.1.91" path="/dev/ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.357219][ T30] audit: type=1400 audit(1732770318.745:126): avc: denied { ioctl } for pid=620 comm="syz.1.91" path="/dev/ppp" dev="devtmpfs" ino=150 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 37.434431][ T661] device veth1_macvtap left promiscuous mode [ 37.895759][ T30] audit: type=1400 audit(1732770320.745:127): avc: denied { create } for pid=663 comm="syz.2.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 38.887930][ T713] ÿÿÿÿÿÿ: renamed from vlan1 [ 38.898495][ T30] audit: type=1400 audit(1732770321.765:128): avc: denied { create } for pid=712 comm="syz.4.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 39.141414][ T738] device veth0_vlan left promiscuous mode [ 39.150803][ T30] audit: type=1400 audit(1732770322.025:129): avc: denied { write } for pid=739 comm="syz.0.115" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.200913][ T738] device veth0_vlan entered promiscuous mode [ 39.209592][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.228031][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.237419][ T30] audit: type=1400 audit(1732770322.085:130): avc: denied { create } for pid=743 comm="syz.2.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 39.255732][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.605713][ T30] audit: type=1400 audit(1732770323.465:131): avc: denied { create } for pid=778 comm="syz.2.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 40.615737][ T777] device veth0_vlan left promiscuous mode [ 40.733920][ T777] device veth0_vlan entered promiscuous mode [ 40.800709][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.812602][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.820585][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.099644][ T30] audit: type=1400 audit(1732770323.955:132): avc: denied { create } for pid=794 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 41.266173][ T30] audit: type=1400 audit(1732770324.065:133): avc: denied { create } for pid=797 comm="syz.2.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 41.898959][ T30] audit: type=1400 audit(1732770324.755:134): avc: denied { create } for pid=802 comm="syz.4.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 42.218165][ T30] audit: type=1400 audit(1732770325.085:135): avc: denied { create } for pid=815 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 42.349618][ T30] audit: type=1400 audit(1732770325.215:136): avc: denied { setopt } for pid=815 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 42.511149][ T825] syz.0.140[825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.511233][ T825] syz.0.140[825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.259855][ T30] audit: type=1400 audit(1732770326.125:137): avc: denied { read } for pid=834 comm="syz.2.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 43.349967][ T846] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 43.380082][ T30] audit: type=1400 audit(1732770326.175:138): avc: denied { write } for pid=834 comm="syz.2.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 43.587923][ T853] device veth0_vlan left promiscuous mode [ 43.613394][ T853] device veth0_vlan entered promiscuous mode [ 43.692244][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.701136][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.709717][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.121605][ T30] audit: type=1400 audit(1732770326.985:139): avc: denied { create } for pid=878 comm="syz.3.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 45.392447][ T30] audit: type=1400 audit(1732770328.245:140): avc: denied { create } for pid=941 comm="syz.1.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 46.803938][ T30] audit: type=1400 audit(1732770329.665:141): avc: denied { append } for pid=1000 comm="syz.0.193" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 47.598212][ T1042] ------------[ cut here ]------------ [ 47.603514][ T1042] trace type BPF program uses run-time allocation [ 47.657859][ T1042] WARNING: CPU: 0 PID: 1042 at kernel/bpf/verifier.c:11698 check_map_prog_compatibility+0x6f1/0x890 [ 47.686626][ T1042] Modules linked in: [ 47.690424][ T1042] CPU: 0 PID: 1042 Comm: syz.1.205 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 47.774418][ T30] audit: type=1400 audit(1732770330.615:142): avc: denied { create } for pid=1047 comm="syz.3.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 47.825924][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 47.889824][ T30] audit: type=1400 audit(1732770330.705:143): avc: denied { create } for pid=1047 comm="syz.3.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 47.917389][ T1042] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 47.925398][ T1042] Code: db e9 f9 fc ff ff e8 be 33 ed ff 31 db e9 ed fc ff ff e8 b2 33 ed ff c6 05 6e 55 a3 05 01 48 c7 c7 80 ed 87 85 e8 df 7a be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 47.946428][ T1042] RSP: 0018:ffffc90000edf328 EFLAGS: 00010246 [ 47.952359][ T1042] RAX: 194e51f4fd907c00 RBX: 0000000000000001 RCX: ffff888113e893c0 [ 47.960509][ T1042] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 47.975845][ T1042] RBP: ffffc90000edf370 R08: ffffffff81579f45 R09: ffffed103ee065e8 [ 47.995800][ T1042] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 48.004659][ T1042] R13: ffff8881155a5800 R14: ffffc9000019d000 R15: dffffc0000000000 [ 48.015754][ T1042] FS: 00007f2a6a3ba6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 48.029351][ T1042] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.046299][ T1042] CR2: 00007fe2b6fb40e8 CR3: 000000012aa09000 CR4: 00000000003506b0 [ 48.076527][ T1042] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.084425][ T1042] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.151320][ T1042] Call Trace: [ 48.154443][ T1042] [ 48.168487][ T1042] ? show_regs+0x58/0x60 [ 48.179276][ T1042] ? __warn+0x160/0x2f0 [ 48.187228][ T1042] ? check_map_prog_compatibility+0x6f1/0x890 [ 48.215549][ T1042] ? report_bug+0x3d9/0x5b0 [ 48.236321][ T1042] ? check_map_prog_compatibility+0x6f1/0x890 [ 48.242253][ T1042] ? handle_bug+0x41/0x70 [ 48.258928][ T1042] ? exc_invalid_op+0x1b/0x50 [ 48.263456][ T1042] ? asm_exc_invalid_op+0x1b/0x20 [ 48.317195][ T1042] ? __wake_up_klogd+0xd5/0x110 [ 48.355777][ T1042] ? check_map_prog_compatibility+0x6f1/0x890 [ 48.369639][ T1042] ? check_map_prog_compatibility+0x6f1/0x890 [ 48.394401][ T1042] resolve_pseudo_ldimm64+0x682/0x1240 [ 48.422030][ T1042] ? check_attach_btf_id+0xef0/0xef0 [ 48.459958][ T1042] ? __mark_reg_known+0x1b0/0x1b0 [ 48.501609][ T1042] ? security_capable+0x87/0xb0 [ 48.521704][ T1042] bpf_check+0x3174/0x12bf0 [ 48.544004][ T1042] ? 0xffffffffa00280c4 [ 48.548051][ T1042] ? is_bpf_text_address+0x172/0x190 [ 48.553171][ T1042] ? stack_trace_save+0x1c0/0x1c0 [ 48.558306][ T1042] ? __kernel_text_address+0x9b/0x110 [ 48.563557][ T1042] ? unwind_get_return_address+0x4d/0x90 [ 48.575796][ T1042] ? bpf_get_btf_vmlinux+0x60/0x60 [ 48.584745][ T1042] ? arch_stack_walk+0xf3/0x140 [ 48.589573][ T1042] ? stack_trace_save+0x113/0x1c0 [ 48.594467][ T1042] ? stack_trace_snprint+0xf0/0xf0 [ 48.604631][ T1042] ? stack_trace_snprint+0xf0/0xf0 [ 48.615965][ T1042] ? __stack_depot_save+0x34/0x470 [ 48.620946][ T1042] ? ____kasan_kmalloc+0xed/0x110 [ 48.630231][ T1042] ? ____kasan_kmalloc+0xdb/0x110 [ 48.635118][ T1042] ? __kasan_kmalloc+0x9/0x10 [ 48.645735][ T1042] ? kmem_cache_alloc_trace+0x115/0x210 [ 48.651142][ T1042] ? selinux_bpf_prog_alloc+0x51/0x140 [ 48.665722][ T1042] ? security_bpf_prog_alloc+0x62/0x90 [ 48.671043][ T1042] ? bpf_prog_load+0x9ee/0x1b50 [ 48.691714][ T1042] ? __sys_bpf+0x4bc/0x760 [ 48.699109][ T1042] ? __x64_sys_bpf+0x7c/0x90 [ 48.703687][ T1042] ? x64_sys_call+0x87f/0x9a0 [ 48.713790][ T1042] ? do_syscall_64+0x3b/0xb0 [ 48.719217][ T1042] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.730369][ T1042] ? __kasan_kmalloc+0x9/0x10 [ 48.734971][ T1042] ? memset+0x35/0x40 [ 48.756455][ T1042] ? bpf_obj_name_cpy+0x196/0x1e0 [ 48.761332][ T1042] bpf_prog_load+0x12ac/0x1b50 [ 48.775784][ T1042] ? map_freeze+0x370/0x370 [ 48.780265][ T1042] ? selinux_bpf+0xcb/0x100 [ 48.784660][ T1042] ? security_bpf+0x82/0xb0 [ 48.789396][ T1042] __sys_bpf+0x4bc/0x760 [ 48.794217][ T1042] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 48.808520][ T1042] ? __kasan_check_write+0x14/0x20 [ 48.818627][ T1042] ? switch_fpu_return+0x15f/0x2e0 [ 48.823596][ T1042] __x64_sys_bpf+0x7c/0x90 [ 48.845742][ T1042] x64_sys_call+0x87f/0x9a0 [ 48.850106][ T1042] do_syscall_64+0x3b/0xb0 [ 48.854361][ T1042] ? clear_bhb_loop+0x35/0x90 [ 48.865230][ T1042] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.874119][ T292] syz-executor (292) used greatest stack depth: 20688 bytes left [ 48.902193][ T1042] RIP: 0033:0x7f2a6bd43809 [ 48.932955][ T1042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.045789][ T1042] RSP: 002b:00007f2a6a3ba058 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 49.085746][ T1042] RAX: ffffffffffffffda RBX: 00007f2a6bf08fa0 RCX: 00007f2a6bd43809 [ 49.111520][ T1042] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 49.165735][ T1042] RBP: 00007f2a6bdb693e R08: 0000000000000000 R09: 0000000000000000 [ 49.173606][ T1042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 49.190525][ T1135] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.190755][ T1042] R13: 0000000000000000 R14: 00007f2a6bf08fa0 R15: 00007ffe1bfff498 [ 49.197624][ T1135] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.226145][ T1042] [ 49.229015][ T1042] ---[ end trace 1a78405e343d635f ]--- [ 49.475864][ T1154] device bridge_slave_1 left promiscuous mode [ 49.529836][ T1154] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.664504][ T1154] device bridge_slave_0 left promiscuous mode [ 49.798119][ T1154] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.466953][ T455] device bridge_slave_1 left promiscuous mode [ 50.472968][ T455] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.480550][ T30] audit: type=1400 audit(1732770333.345:144): avc: denied { create } for pid=1191 comm="syz.1.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 50.499996][ T455] device bridge_slave_0 left promiscuous mode [ 50.509448][ T30] audit: type=1400 audit(1732770333.375:145): avc: denied { create } for pid=1191 comm="syz.1.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 50.533997][ T455] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.580968][ T30] audit: type=1400 audit(1732770333.375:146): avc: denied { create } for pid=1191 comm="syz.1.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 50.699002][ T1194] device wg2 left promiscuous mode [ 50.708562][ T1200] device wg2 entered promiscuous mode [ 51.696766][ T30] audit: type=1400 audit(1732770334.555:147): avc: denied { create } for pid=1233 comm="syz.2.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 53.436099][ T1295] device veth0_vlan left promiscuous mode [ 53.470127][ T1295] device veth0_vlan entered promiscuous mode [ 53.525135][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.554415][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.563045][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.837226][ T1320] syz.0.284[1320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.209280][ T1332] device sit0 left promiscuous mode [ 54.274633][ T1332] device sit0 entered promiscuous mode [ 54.618736][ T1334] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.627953][ T1334] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.994674][ T289] syz-executor (289) used greatest stack depth: 19520 bytes left [ 55.657924][ T455] device bridge_slave_1 left promiscuous mode [ 55.664056][ T455] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.671487][ T455] device bridge_slave_0 left promiscuous mode [ 55.677508][ T455] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.338140][ T1409] device veth0_vlan left promiscuous mode [ 56.373476][ T1409] device veth0_vlan entered promiscuous mode [ 56.414289][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.422664][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.430452][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 56.712501][ T1420] bridge0: port 3(veth0_to_batadv) entered blocking state [ 56.720086][ T1420] bridge0: port 3(veth0_to_batadv) entered disabled state [ 56.736830][ T1420] device veth0_to_batadv entered promiscuous mode [ 58.145690][ C0] sched: RT throttling activated [ 58.418712][ T1445] syz.1.302[1445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.418792][ T1445] syz.1.302[1445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.497486][ T455] device bridge_slave_1 left promiscuous mode [ 58.514599][ T455] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.526476][ T455] device bridge_slave_0 left promiscuous mode [ 58.532442][ T455] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.543524][ T455] device veth0_vlan left promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=3 req=230 state=3 status=67 (errno 32: Broken pipe) [ 60.477445][ T455] device veth1_macvtap left promiscuous mode [ 60.483284][ T455] device veth0_vlan left promiscuous mode [ 62.116490][ T455] device veth0_to_batadv left promiscuous mode [ 62.122512][ T455] bridge0: port 3(veth0_to_batadv) entered disabled state [ 62.130089][ T455] device bridge_slave_1 left promiscuous mode [ 62.136084][ T455] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.143200][ T455] device bridge_slave_0 left promiscuous mode [ 62.149180][ T455] bridge0: port 1(bridge_slave_0) entered disabled state