last executing test programs: 4.440023969s ago: executing program 3 (id=5055): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000007f0000000100010002", @ANYRES32=r2, @ANYBLOB='\a\x00\x00', @ANYRES32=0x0, @ANYRES32], 0x50) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1e0000000100000005000004006a53ba45161a2c7d09dff637ef55966ced52e32dcc4f75598f3fe6b25b2e0f4acca74f00b5cfcb6d16448b05662639ff0b4bcf7848c2829bef5401af051fb3400b3eb4567fb2bd4f8d9dcbaeae91f90af43072002fe462f5bac85f012309d744a7540e16e7a98a331aa12ccf23128b", @ANYRES32=r2, @ANYBLOB="001000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200000005000000050000000700"/28], 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000003c0)={r4, &(0x7f0000000300)="334272bb2b6ec99aaf9764ed48286c12", &(0x7f0000000340)=""/118}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r5}, 0x18) (async) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4c) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_batadv\x00'}) (async, rerun: 64) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8946, &(0x7f0000000080)) (async) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) recvmsg$unix(r6, &(0x7f0000000540)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000a80)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)=""/41, 0x29}, {0x0}, {&(0x7f0000000980)=""/98, 0x62}, {&(0x7f0000000240)=""/59, 0x3b}, {&(0x7f0000000a00)=""/65, 0x41}], 0x8}, 0x140) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 4.158702243s ago: executing program 3 (id=5058): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020722500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100, 0xffffffff}, 0x0, 0xffffffffffffffff, r1, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRESDEC=0x0], 0x0, 0xfffffffc, 0x0, 0x0, 0x40f00, 0x47, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) (async) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x8}, 0x18) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="00000000840000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="030000000500"/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0xa, &(0x7f0000000340)=@raw=[@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit], &(0x7f00000003c0)='GPL\x00', 0x80ea, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xf, 0x9, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, r2, r3], &(0x7f0000000840), 0x10, 0x9, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e0000000400000008000000081000"], 0x48) (rerun: 64) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="020000e5030000000800000001000000800000000053916f27952a003588fc9b83a72d6f8943f168f868746de079d12278f592", @ANYRES32, @ANYBLOB="0000c00100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010000000100"/28], 0x50) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000c17900"/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) (async, rerun: 64) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) (rerun: 64) close(r4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) (async, rerun: 64) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x800) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) (async) syz_clone(0xa40f5000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.149546933s ago: executing program 4 (id=5059): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="e4ff00e2", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='ishtp_dump\x00', r5, 0x0, 0x9}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x23, 0x0, 0xfffffffffffffea5) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x5, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x5, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xffffffff, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 3.931584576s ago: executing program 3 (id=5064): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r3}, &(0x7f00000002c0), &(0x7f0000000300)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x300, 0x0, 0xdb0, 0xf5ffffff}, 0x0) 3.854984297s ago: executing program 4 (id=5066): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1e0306003c5c9801288363"], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x15, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000007000000020000000400000005"], 0x87) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000300)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r4}, 0x10) r5 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r9}, &(0x7f0000000340), &(0x7f00000004c0)=r4}, 0x20) write$cgroup_subtree(r8, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) 3.740260489s ago: executing program 0 (id=5068): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000340)={'netpci0\x00', @multicast}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000003"], 0x48) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="0600df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x17, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073010500000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2080}, 0x20008004) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r6) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.64243202s ago: executing program 3 (id=5069): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0500000004000000080000000a00000000000000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="deffffff000000000000000000000000000000000800000000000000"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001100)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYRES32=r1, @ANYRES32=r3, @ANYBLOB="0000000000000000b708000000000000027b8af8ff00000000bfa200000000000007ffffb703000008000000b7040000000000008500820000009500"/70, @ANYRES64=r1], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r5, 0x10f, 0x82, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r6], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) close(r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r3}, &(0x7f00000002c0), &(0x7f0000000300)=r7}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00'}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.561103831s ago: executing program 4 (id=5070): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = getpid() bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="1b0000000000000000000000000000c000000000", @ANYRES32, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="0000000b2eb20765ae82ebad21f3ee37390002000000000000000000"], 0x50) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x81, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x80000000}, 0x0, 0xc8}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000081"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000d5030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xe) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0d00000001000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYRES32=r9, @ANYRES8=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r11, 0x0, 0x0, 0xd5, &(0x7f0000001340), &(0x7f0000000340)=""/213, 0x7, 0x0, 0xdb, 0x56, &(0x7f00000004c0)="40f75eb638320ec61c3cd33e0fcbe65b4024e5755a55f440ab2337c2cfc67cf99d473552dbbcda8ea505fb0be1f4dd60849c2bbf3c72adf974b961f824298e2e123d73fd8dc330308a71151a94d96226945b5b4965284fcbb8b9ad2b4f187e52b87ec077f970ade7a84fbf2b2f849ba89cd58aae3080d6f8993b5b4249bf5eb10a13cc40e9469f48ee073e84e192a3b933af00deb9da70926dbd695a58c3f0d886e7469a4bd2c8da978cd9df66ffafc056528f369bdcf0bf808954ec89d09547b45018d817290af540adafa76c59040adc8e78a67172b0766ccc7c", &(0x7f00000005c0)="850bb5b02173950a9dd2b23bb536f92f6852ac9870caf4650528d8fbfeae36a6e269410774ba1985a927a24559eabdcb0831faa83f7cdf8a9c69a055e525a22a51e52520d508e199c87fd183b3df4d11fda4723c4ec7", 0x7, 0x0, 0x9}, 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r12}, 0x10) socketpair(0x2, 0x1, 0x0, &(0x7f00000000c0)) 3.135955737s ago: executing program 2 (id=5072): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_config_ext={0x0, 0x800000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) unlink(&(0x7f0000000200)='./cgroup\x00') openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open$cgroup(&(0x7f0000001000)={0x1, 0x80, 0x1, 0x3f, 0x1, 0x9, 0x0, 0xdc, 0x8000, 0x7, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xeaa, 0x1, @perf_config_ext={0x2, 0x4}, 0x80, 0x2, 0x10, 0x6, 0x24, 0x5, 0x7fff, 0x0, 0x6, 0x0, 0x3}, r0, 0x8, r6, 0x0) r7 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x300, 0x0, 0xdb0, 0xf5ffffff}, 0x0) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) close(r9) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c3942, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.94019487s ago: executing program 2 (id=5073): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x8, 0x7}, 0x100100, 0x0, 0xffffffff, 0x0, 0x0, 0x2004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x15, 0x4, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x0, 0x10, 0x1}]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/219, 0x1a, 0xdb, 0x1, 0x0, 0x0, @void, @value}, 0x28) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8923, &(0x7f0000000140)={'pim6reg1\x00', @link_local={0x1, 0x80, 0xc2, 0x25, 0x64, 0x2}}) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000008500", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x6, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000004000000", @ANYRES32=r7, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r8}, 0xc) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) recvmsg$unix(r9, 0x0, 0x0) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r11, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000005c0)=[0x0], &(0x7f0000000640)=[0x0], 0x0, 0xdc, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000740), &(0x7f0000000e80), 0x8, 0x2a, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x1b, 0x13, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000001}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x5}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff7837}}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x3}]}, &(0x7f0000000480)='syzkaller\x00', 0x7, 0x8f, &(0x7f00000004c0)=""/143, 0x41000, 0x2, '\x00', r12, @fallback=0x31, r2, 0x8, &(0x7f0000001040)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000001080)={0x0, 0x8, 0x5, 0x9}, 0x10, 0xffffffffffffffff, r8, 0x3, &(0x7f0000001140)=[r10], &(0x7f0000001180)=[{0x3, 0x4, 0xc, 0x2}, {0x4, 0x4, 0xc, 0x2}, {0x5, 0x1, 0x3, 0xc}], 0x10, 0x90, @void, @value}, 0x94) (async) sendmsg$tipc(r1, &(0x7f00000014c0)={&(0x7f0000001280)=@name={0x1e, 0x2, 0x0, {{0x40}, 0x2}}, 0x10, &(0x7f0000001380)=[{&(0x7f0000001dc0)="2205d7e81d4f291e7256f18a00b3d59df1b1d030b660771c6d7b29d9bd712539e71b7dcfeae9a9f6b774da3610ac46b001c24ad1b3b73bf22d9852d5d09e283f389a22f1f4ba706412457adea507927a8cd3653be030b94b1c180c590fe0208e6a6bf70bbc00f0ddc23e5d8b5510ae54e4ba8b46e6733469d76e8e339e530ba3aa8e83fbce414222d2d287252a76af244db235f5993840ccaa45dc388d227cba314e779576dbca02b9138834f0a8a443b5f4dc9b79a8a1ca3042d9f5c35972a1a899a50830ed8ae1c24b0f965c44cd9e3060cb2c724c9729050fa346d90358ed477e0b3bb9059cd85c457748b2ccab5a95ce97936f5e313f4efe87431336dfcfd19f30fe0cbd75c44782cef50534c26edaa95391b3dd10fbbefe9f86aa59b804b65cb9c975ce6d54acbc532ba127283ac4d98b09b2c17f67a04970a06ffaa4236891a7cbd5b03e13b85101f25ff77c0f474918e9f6548e13faf62573487cfe9318ee46965e0584a1572a5892e39b77cc5a144579d8f3b0a3d67d5197c4d852ce9950cdda842669e9938d486bf2bd74213c368fb165fc67a840dd7204657c447d631ac19ba99b516f51805c5afa2e4d97913f27771c13c6ee0ed54b365faa42022e3c70a85815480845d884c747711579ac1bbd8f0ad88e8328b178b1b5e1b8e4c8a5049a67756ee4ad21844099ac1d6837b09d1622003dbc651afc9607bc21b18bc06dc9a44fb372fdb35ae1689d2f0849c48ae6bd168052f42d762324712cbe1ee2268b91e8f4023a2a1246d9d8be1b2b7149973886176377e766e786881a70909d115f25a80bf40841be4a02999e760b3dc51e4c5a2d2d4fbd65d8bdd42a9f151e31363920730069eb8025271d19ef45e91efcf6d622f21d8003160409d55ee8d7e3306281e96818b0b361430a885491e4218191c0189682e663190a1afcacbb5f27836cd66079edbbbb180cf8f7d151c955a2cc62e76d875eda6c3b1abcb802894ae3780cf1882d6b61a1470eff26bdb982561c8c7f2077d40c221a5315bf0830178cd14cfb6055b0d6a22864050596fe9b9ed3a84219298959126316674eb7ae4613f1ec02f6d0ee4fed3eabffd6a5675ce772451ae3b5d6a81d3bda3ed7a2eeccbbd348f8439e03c4d368f2105c1eea0e99d82911fa12de71ec4931c5069a37ac039dd55f73a8ee2f19b432e3af3e273081be57e759f28f84d281e26870163c3cd2dbc11e75af1eb36a0c8043054868b0e413491b32ff09722b7fdf21cf4cfeb293cb632aceaf70aca53e2d439a3874e196f2e2e98ab28851225ce82ef1e538b0f631d0d4d1e884d9c311862944f5d4491ed8fbe95b6f132e03940a8c0fbf985fb4a850033e98e0f0bd08b2e616cc480223d628b0c7057e02257999dc99778b94077c857612aebf3ffee08e7451f697e17c8838f53c3ec8b43c1e6ce26820589a45392517939a86e45440b1adf88ede256227b7da10cc1b25af9781ae2e13150fb5fcbb4e5fbc399df08f5053ebf2607dd79462cc20f416b579b421d6d9022285760f470dbe1b961e0b98669afdb7374ecf03db91c48ea58436d5d5e36e70acf1d4d071cae50c4c70ed6fb0ebb135a022fae85c1412a32642d8dc393e61e76ff442cd084b565d124f4b033efa4d419696eb1ae2c7a1b61558322d589ed3374ad3073efed6f1cc70d354bbfb5f392eaa57fc505ffe248f4d5c96973c263e62260a823f4cfb5247f0385620aefad1f8dd95568aca4221bf9cf6f5c6dd11ceedaf7965a4c090c978b9df463002ee6d7d980c26c8951cf9f911d94a18dd3b2fb11e1b4e52e9b1e2f7f9e0c034153e343176fa66a721939ef174f21f6efc69af81d9c19e6f1840087c2dbc6cbd96a76be8966c2c427bdbc533c95bb843a40f5c1b0aec4e2490c221d1cbb9dddeb9266dd89ec1581e5160374775a8812100b551abfd4b3fbc06d261b3de92c3e2d5ac89d6cc93641aea557fbbb56aabc7ae888e9f025cf642e19fb31667f9aacaec965c4bf608cd6bde025d34cffe997dc9449485ee9934c079557090e52f0c641008ddfb67cb915e2657c88150435436246c75766b7d33be6fd4ae4242b86916da416ea7120b1dcc5b7efb5cb91bb835427d46d0ab7160bab499f1916b4235230a784942ce466c478e4b4252c9db3c2e5ef3d3a62d8f3df69d66047dd3d4ead041213003fa3cf44a3c4521f626fd74cbc125fdcc902aa2b7ab5f2b7ee232fad1541235f884fc98c720e046867e5236069a301ef67c9ee9b1b88e8a8573c73c47b7f606f4fd86758719cc00e98507d84ac12147c572e3fb7e35e4fabd2bc9e933cef8432fd16073f797179e7cd98d2a459003c09fe682901f694a12b859a5f9fc1b997bee1dd9f0580f0193cacce1adcba0c6987fd06c1714789d1ef453da970018c6fbccd3bd9d0f513ee315151c05e2487f7889ed3c9c03280b6415f23db20522d5a1169965658fd38277d4841a94a3553c29dd9b54d82518b1dc0dab051ff63090bfdd67968c4381564f07e99d6f8dc1deaf9316d5846a1e8017b3251e97388d98227efd29e09cf4c1f552da696c26f68083570d7d7b41458e8d112e7c1e22c6921ddb61e7b46cfacc1ec775d8f9d8e32300e571e9a15858e959ff66c48238f407adb702a2667ecdb1889b5fbddf1982e7a7240f4bd95f39fcc4faca463cee89f553bdbfd98b1c11d4d66faf4b38e59c7e7a1df16fcf8b379f93cb39454bc1ecfceb570b12c40cfb2f7ddb1412e99e0c77b485db6cfe801b30d25f83aac066f20e9e3640298b6974afe5949dd5fc97b56a71f9181379a4e1b3f2c2a8d9ffdb8ed255451d51578758a7c719809e05608db075a3728fa8462e8698dfcd2ee58139b18820e668c0b72876e6ab0c4583e83bc516ad779b560698f2e73537f60280969eda175fa734aac1e70168f67955bba4020e8dfb30e85071a303380a43804668652796622b4ad6bf41ea462de7b261a00c63c94dc2a16806ec5e8a09aafb03502c66cf2bde302fa49b3b23daa2f3e02bc8aedb47409903e5d22e5b6f498e213ab2eba261049515a45af2ebf83e12fd1386c2e4e76290377c3c53b8a2aa1c8cf8d176fe198a37f06c7e25121d6f4ce5f10bf267f5f5c37c9a85b5f1a35059a094126bb10c51f3174d1c1a58665bf5828839d3101a3ca7c14d6f6d115e8608cb90f99a42598b0a11bb7f30cb4fd31e8fde4e713bc7ae71c1d16b6020bf7a9a20fa099f927d63e7b748c25065c17afa8647d231598dfe7d3854476b3a85a4459cae3692e96a15aaa8447c07fc523dd84b000f28c853fbab5db626fcf4a5a97f77904518a7f361bfbbd2e97788539ee6d5839243c3eb3b5062889b4f964c4cdde3f15feaca5fda0523bf55f348277938bce200c07ca5af484fafbb4e604172da81784e46ab0528dd8ec5da2409c4dc7085a1bd09f91fdd45dba4316c21681661d88f316223cb9bce8b049b04c8909b82ffb0f8b7e8e7bae38fd9c67d8bd7a0a841ed9fc3f50a5c73912e232014af8369db883c377bfde5b02c141217e49fa2497e78dbf793eaa558b99623df1c5c966ca4490a168bb2281742b04f4b69119a940b8bcaa57d4e8cba6cf04f477533a818a698ae8e7bfe7be303e81b21d30f82e1ec94e50972821867f2e839db090f823cfb061f30aafde4b98c5b373eb0d65118671d55544619ab8303057d407c92ab0a0d2805e98b379ba8ee416bc844b7382020870bb22a2babf279d96f475bdcd03418a8070c6165b5e09e15a68b2b3f2aface5bbd171f24d95a0a36b12345da962d7f8387db42dbed784e31c9132e4c4522d9eac9546c2569b3051d8f789a081a7701e5f3fab0e56c04d57762250e738c9fd32c17c7e2c618ea872a15e9582eca81d4099b7a0a35a36058635d7e905e3da4a38e74de987f93fb548706fd0f23b29f5d053abfdef57adcd4f5e9dc81c779236476c0093015ea1884c0d66169d95d8085167e319b72120955f1a641eac58c49acb903609accf29331200274872f0504692667f623ae2adab561554a3a90184dccf5a062893608f6750c8b028e83f4e1f7b68f911cf48a6c556f659efff62dcb0416c89867ee1f52f1b091d08abfb1be67f2b8643f28a9e447c045a9cd00226ce24f3af17776105e251a1da3dd681875fadd83856b1bcf37103033a6c9ef590dbec49c2fcea49ba84b37a85166cd331aa66b2e8c3fa876cc3ca16c25c5e7e6fd6960cfbd598aea90c42a6aab4c88ac4881d3ec946c920f679a4278762aca094bfa2250467f33133126338866436ccec24661976efe75c56f9f86f4286526848b2f8e675e8a7ac405e070fab26d1c4979d45c2da9f0ebf979f24a3e623809819e6d25d9733bf8e6a3377812baf06d2f67d2e9f07e5d807c1ea74337e7142a79837c451dfbe0c807e370d94072a7d0fcbc96d70c2c15b24d4aa6c457f4132918006cc15c0ce0a8aef75da4b6dad1a80fd463b3a54397e3d2223a0dd265e00ca09e534dfb2ae758909bcd819b4eb94f3c1d72027fe5ef5c2f9cb95c59cd792f817f935032ca9e169ed33c8e70af3974f96636c4ae28666a4c89eab600ed099fed53a1b11e58b7eb9aefa6ace8c802951cfea6716d31220f6a88a56ab696ea77827aa43fea0cb846ed199d4c65be51c0f788cf81fe92226dab6162ef46b6b3888fa7ad0fb504936829ca8c2efe8e30809d857022881743f77f997d43950826f9bb1ca5eb24107009d680a308339690038b55a8089fe4a9de583f0795f6a2182d12d3f546c789fef07bd1a5ae40460ac7cad688b604fcf05aa5dbd959b5c23920f4603357e03d42ffcbd10b7c26c0cd71a99d16ebf2f77ff2b103e803e5a0a05df1bc8d67134010897704423d825a95e5100ac5ba431fd9123245fd22ccd6ded19c09131365091bf752a5a8445ee8516e10783522e24fbe2983f343a22c70a66640fe7dfe5c161685bd3e3a7c868aacbb5d54465a165d8061cfe2afeb55b5c82402fe4ee163e4a7336d8fa3c20d94ff02ec7d5828c45627887dfe49d0f22eadaaceb54d6cb0cd37bd15f6990b41ad83e6a23513db9bf5ac0934666bf854c475167d07e640e0e1a12e8843c4e7eee290d2423def928090a37f7070c21c7e5d60994f8578f84f1f17bc107e738ffb390fe7f058348db4c5fec3601b589ad6a66d8f52f964f0148f76b560864cd30c23de8399c9bd6100d1283b79be1b4adf5fca4f1016c2f05f2ef06596e97cfabdd50ecfc5c3a57ee670c08da71e477a2496840e698d4fe3b623e8e0f6a31e3d9573a7da8e33e01f3f7abb6942f96aff387211696e7d39922ec2f76d20e198f97dfe18b63ba4b12242f3f9e9a8f84b0ce167974d5ab0a24285feb610fc9c634b390f0504417501cec75241d7cf26ebfd9087c3808280ce8bf2636cc65cba8cb9802ba3a6110579fc941637844700ac9af84a4c703a44e7313353e047f8db1254c1565a91152478547103f10cb72dad7a7ed959134de77cda9e38d790980ebd28dbcf1e58221f07768b718cc31e726eba45afc19f8e9d68ea92472d288eec4a562806260a15c21ced085887f54eddc9e1dc321d9aa03fb4e17170dbfebb1cc64ee06f6355a5b81e62d5080d49a59d7f729dd60320a2ba0a6d07e4613c5e4dcd88c02f5e4ee5f14354dfa67e8dbccffdd4ffcf949b3bc18ac15c827a873a4e7690c006e4ba0785682c8aaeb5a97109e47e9a1e5c0a72c90bc463527c70edea35cd66764da8571f6be5615e11e956f9bf2f2118e1a10d558866d7e24a937c776a4ae6e2f6d4f9b8a2b0dab1", 0x1000}, {&(0x7f00000012c0)="9f5db9292792e3a58f03d612ab9cf4c2817c3325a405aac5809efe8eb4b4af29a8c6680a897a5c906305dc3818365e9b5bf0bb0e7ddc4690a50f4130c6c1558ee2deaf57887aed0d6f8cb743c22fa2bab87daf67c99664d4a17804df3e51628efae59e1b9e1da412fb03fcceaa860f3912c5b8c36d045fd790d1347214f04b6f7e3945ac4109b2db1db06d81ecc51dc8182d7babadbdf379d748be3306a8c158b6e7a32e2dbeb0484ae258e4555cdf1308a309f7de532d64f922", 0xba}], 0x2, &(0x7f00000013c0)="f345559855f08a56f4d1ca76c85b7a134b93ed04a254a9ee21cd1847f13524df248f34645a64eb85b635a7022208493f078c743755a3c8f36fd5ee75c8e1934b8c8ce677a3bdf74c6551334ad173d21eadd15298dbb842ddcd8856b246c90c9544ec0e8e5d9bbcf15f5b68c323fd45c5b04c8df300770f8dbcd19231cc2f79ef058587598143d2fe5fc65e3102a49d8c1d0f1b9c5fdbfa2f8cf3876c20ce7b4676a2675275f9b43ad0a9bcd2ac57bf864a3ea04ea6f5752f32c88b5074", 0xbd, 0x24000c10}, 0x801) 2.874639811s ago: executing program 0 (id=5074): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb227733218120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x0, 0x1}, 0x18208, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xf, 0x3}, 0x842a, 0x200000000000000, 0x7, 0x5, 0x0, 0x1ffffd, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x3) close(0x4) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x3, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000480)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x48, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r6}, 0xc) openat$cgroup_procs(r2, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 2.768378552s ago: executing program 2 (id=5075): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@enum64={0xc, 0x1, 0x0, 0x13, 0x1, 0x2, [{0xa, 0x3, 0x5}]}]}, {0x0, [0x0, 0x30, 0x61]}}, &(0x7f0000000280)=""/190, 0x35, 0xbe, 0x0, 0x9, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='console\x00', r1, 0x0, 0xfff}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x2, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2c, 0x3, 0x0, &(0x7f0000000040)) syz_clone(0x1000000, &(0x7f00000004c0)="a34dc8f9e5ca248ba95d999cf6d59c17001f790a1886fb572b544992833269f573acedbdd6b2228d782512f4bfb29053d7f886afcf9031cf18787db5b9f8ba7bfbd9a1d8630797bcc75864293a", 0x4d, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="a9ea0dd7f52ef449c3562a53b76e1aeaa6b9a857ee3b5c842379073aa097c3b4daa8c527ea1a11dedfe3f00534fe10") bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) 2.503488465s ago: executing program 4 (id=5077): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000700000001000500"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x10, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000600000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008500000023000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) 1.561086849s ago: executing program 2 (id=5082): bpf$MAP_CREATE(0x0, 0x0, 0x48) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)) (async, rerun: 32) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='mm_page_alloc\x00', r4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000a50000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000026c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='mm_page_alloc\x00', r6}, 0x10) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r7}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) (async) r8 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000001180)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000001ddafa9e7b8edb7bcef9e6c5fb5a083547dec275241ea974282b8b02716608cdd091ab62bada3be667b1d0810104340cb92c44676294aa959e8c36b009f5344ce3cd040006394ade20502ff922b36de02db8a9ab0ae20def873cfb336e20d9c298e76f65fab173a3f9423aba51c8b65e6421e399fc5317f99ee5e04ce19d91578b02d40d1108", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 32) r9 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r9, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001280)=ANY=[@ANYBLOB="02000000060000000500000004000000410004008e4a0760ce49d4ebc49c57f0742132f954572a774cb391", @ANYRES32=r9, @ANYBLOB='ec\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x50) 1.41651598s ago: executing program 1 (id=5083): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000007000000000000000000000001050000018000000000000000010000851000000000000000020000000000000000000100da"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (async) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xfffffffffffffff8}, 0x0, 0x20, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000077d29dba53ad252200"/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x18) (async) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000002000000000000000100000d"], &(0x7f0000003740)=""/138, 0x3a, 0x8a, 0x1, 0x0, 0x0, @void, @value}, 0x28) 1.413657381s ago: executing program 4 (id=5084): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8, @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f34"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdir(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000002300)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000770ce27cc26c54ee08288a1f151d69ab7872ef93bd63b0b23ec53cca3611ee3fbe918aaf20d02baab4dbb299c04241ae"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4003, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002280)={r0, 0x0, 0x55, 0xe6, &(0x7f0000001080)="b6400e47361477fba3c6e9f41b1953dfd94532979492df64d8a6ff928e01dee619aa40abd35086648f8e8eb28af38e19d66c59503c8544d137ed71624c4b7c4cb04a4429e98661af0708638163ef3bc826c297b8ee", &(0x7f0000001100)=""/230, 0xce7, 0x0, 0x1000, 0x72, &(0x7f0000001200)="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", &(0x7f0000002200)="cf2b5d633f7e750c0c49583e23bb5a0f2f4dfdb7fe686f3e2042929a1d426c4ce08a1832f728f9880202bc6d674761fbe9290502b219f9bc788d6411c22f992bdf3f515f4d4f4e87f61ec5dd2c8147c5a3bbd57d91e3cd7f2c91c8c51473a0291eada337e5ea862c2eadb3ebc4d4bcabfd3c", 0x2, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1000}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) 1.333146582s ago: executing program 1 (id=5085): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES64=r0, @ANYBLOB="ff00000000c500"/20, @ANYRES32=0x0, @ANYRES32=r1, @ANYRES16=r1], 0x50) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x10000000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (rerun: 32) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='ext4_request_blocks\x00', r4, 0x0, 0x5}, 0x18) (async, rerun: 64) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0xfe, 0x0, 0x4, 0x8, 0x0, 0x6151, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2002, 0x0, @perf_bp={&(0x7f0000000500)}, 0xa100, 0xc8, 0x5, 0x1, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x7, 0x0, 0x8000000000000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 64) recvmsg$unix(r5, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (rerun: 64) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[], 0xfdef) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000380)={0x0, 0x8d, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) close(r3) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r1}, 0x8) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r10, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) (async) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.323599662s ago: executing program 1 (id=5086): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xf, 0x10}, [@ldst={0x3, 0x0, 0x3, 0x0, 0x2}], {0x95, 0x0, 0x5}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xba, &(0x7f000000cf3d)=""/186, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3a) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r4, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000000)="b9ff060000000000000014f088a8", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x12) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETTXFILTER(r7, 0x400454d1, &(0x7f0000010000)={0x1, 0x5, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x13}, @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @multicast, @multicast]}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'macsec0\x00', @local}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r3, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x6, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000400), &(0x7f0000000540), 0x8, 0xdc, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000007c0)={[{0x2b, 'io'}, {0x2b, 'devices'}, {0x2d, 'net'}, {0x2b, 'net_cls'}, {0x2d, 'hugetlb'}, {0x2d, 'cpuacct'}]}, 0x2d) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x7, 0x1, 0x7, 0x200, r9, 0x3f4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x3, 0x2, @void, @value, @void, @value}, 0x50) 1.181270534s ago: executing program 2 (id=5087): bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xff58) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000071103d0000000000950000000000000020ffb157ace35d56c7872bbf4c17faf942ac303bcfee8580623b0400faea35c247d97007258f88a1cdd8af7b944fadc81474dc1610ae07d3c186a9e4c35104a604594e57921008056f1f"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 939.965357ms ago: executing program 0 (id=5088): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x18) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 915.201698ms ago: executing program 4 (id=5089): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x31, 0x0, 0x0) socketpair(0x21, 0x80000, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)={0x1b, 0x0, 0x0, 0x9af, 0x0, 0x1, 0x7, '\x00', 0x0, r0, 0x1, 0x1, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_ext={0x1c, 0x13, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0xd}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1ff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @alu={0x4, 0x1, 0x3, 0x0, 0x9, 0x30, 0xfffffffffffffffc}]}, &(0x7f0000000780)='GPL\x00', 0x2, 0x72, &(0x7f0000000880)=""/114, 0x82200, 0x31, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x65, 0xffffffffffffffff, 0x3, &(0x7f0000000940)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000a40)=[{0x3, 0x5, 0x10, 0x2}, {0x4, 0x3, 0xf, 0x3}, {0x3, 0x2, 0x2, 0x6}], 0x10, 0x6, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000bc0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b40), &(0x7f0000000b80)='%-010d \x00'}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce220003"], 0xfdef) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70200001400feffb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x13, 0x29, &(0x7f0000000480)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@alu={0x7, 0x1, 0xc, 0x1, 0x4, 0x4, 0x4}, @map_fd={0x18, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000300)='syzkaller\x00', 0x5, 0x15, &(0x7f0000000600)=""/21, 0x40f00, 0x70, '\x00', 0x0, @fallback=0xb, r0, 0x8, &(0x7f0000000640)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0x6, 0xfffffff8, 0x401}, 0x10, 0x0, r2, 0x8, &(0x7f0000000c00)=[r3, r5, r6, r7], &(0x7f0000000c40)=[{0x5, 0x1, 0xe, 0xa}, {0x1, 0x3, 0x8, 0x4}, {0x2, 0x4, 0x1, 0xb}, {0x1, 0x1, 0x6, 0x7}, {0x3, 0x3, 0x3, 0xb}, {0x1, 0x4, 0x0, 0x4}, {0x3, 0x3, 0x9, 0x1}, {0x4, 0x3, 0xd, 0x9}], 0x10, 0x5, @void, @value}, 0x94) r8 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000240)=0xffffffffffffffff, 0x12) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xb, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0x10005, [{0x2, 0x5, 0xa}]}]}, {0x0, [0x30, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0, 0x2e, 0x61]}}, &(0x7f00000001c0)=""/257, 0x3b, 0x101, 0x6, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x6b, 0x60000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffbbfe, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x89f1, &(0x7f0000000080)) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r13}, 0x10) 868.025488ms ago: executing program 0 (id=5090): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000026c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0100000007000000fdff000009000000010000", @ANYRES32, @ANYBLOB="02b6000000000000e1ffffffffffffff00000000", @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000060b4ebc4375dad690000000c00000100"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x6, 0x5, 0x4, 0x40041, r3, 0x6365, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000700000085000000030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001100)={@cgroup, 0x22, 0x1, 0x6, &(0x7f0000001000)=[0x0], 0x1, 0x0, &(0x7f0000001040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000010c0)}, 0x40) socketpair(0x6, 0x6, 0x400, &(0x7f0000001140)) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 786.638999ms ago: executing program 1 (id=5091): bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$tipc(r6, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000640)={'dummy0\x00', @local}) 636.637671ms ago: executing program 2 (id=5092): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB='7}'], 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYRES64=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000020008276c66e16dafec8c6e9d039272a35a48892be0594dd44000000b499b8234b7c4fde1b334b2e4e203f20c60c4840155c5342ed1bf192a8be7ace41b23e712a86353380567c26576493c5f1e092855816c34ef23a95f19dcf41a5919f40949402ce331ac56c212da448e43f4589c2e24a54e27a68dad202c4dc439a84f3"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x2440, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000440)='sched_switch\x00'}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x85831, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_bp={&(0x7f00000005c0), 0x8}, 0x8000, 0x0, 0x6, 0x1, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x1a, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180200000000000000000000000000009500000000000000"], &(0x7f0000000640)='GPL\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg$unix(0xffffffffffffffff, 0x0, 0x800) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x18) 433.680734ms ago: executing program 0 (id=5093): r0 = gettid() perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x4, 0x1, 0x0, 0x4, 0x0, 0x2, 0x400, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0x4}, 0x100000, 0x100000001, 0x7fd, 0x7, 0x3, 0x3, 0x1, 0x0, 0x7}, r0, 0xe, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a2cb77f4ee4bf0b3cf3bbd49ee0acf15f4cf1b42b7ec5f7548d151c36a40bce4af8e337df194965833c40d430a0e620b98b8ea937a04e05bb3e8f8dc6969dc675a833449ec615a419826831075c28829476158677270911c30dda5b71c22efa9381bafe07a060849cc7642989d61b235"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000840), 0x2, 0x0) r4 = openat$cgroup_freezer_state(r3, &(0x7f0000002b00), 0x2, 0x0) close(r4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6d50745d}, 0x0, 0x0, r5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r0, r5, 0x0, 0x3, &(0x7f00000003c0)=')]\x00'}, 0x30) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x26e1, 0x0) close(r7) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8948, &(0x7f0000000700)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OGK\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x00VF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xd9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf1\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xee&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\xd8\x9b\x87\xc8k\x93\xa4\x15\xcd\xc4BH\xa9\xado;\x9f9%Skk0\xeaa\xbe\xc65\x9aq\x11>\xc5\xb1\xff\xb1B}\xa2\x9edC\xd5C/\xb98<\xe9\xc77\x9a\x98\x9b\x8f/\x84\x92\xa8_*\xef\x9c\xd8\xce)\x9e\xc5\xa8!\x05\x91n\xb62\\\x0f\xd0h\xc8\xbd\xe2\xa4\x02\xb4\xc3\x9e\xfe]\x80\xde0\xa6us\xfd\x1a\xe9_\xf2\xc2') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40010) syz_clone(0x800, &(0x7f0000000780)="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", 0x1000, &(0x7f0000000080), &(0x7f0000000200), &(0x7f00000004c0)="f63bf373ccecd78a866c138a1130f5fadbd2b612137f192c73e2be71b330b38687d77e721ed160b2c1dfd5e77d120cb2a4c285446270a41667debb8aff74b5ed9245c9b6d7d61022d72c56867ddfc71b69d94573b8a948e81350f5d6f7d7591c9324b50450f987d22ea624b7468237530d17d0c06790ec993c4a38c9eeb303251398b6d03953be0de7db32823fd966dce86e856fa493fb9c691e441d19417e50e64085a9abf5aaf5a841f5ba8a") bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r6, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x1000000}, 0x80) 270.480226ms ago: executing program 1 (id=5094): mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000100000d00000000000000000300000000000000000000010500000020000000000000000000000300000000020000000200000000"], 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 268.685077ms ago: executing program 3 (id=5095): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 176.979598ms ago: executing program 1 (id=5096): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{r0}, &(0x7f0000000980), &(0x7f0000000b40)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000000), &(0x7f00000005c0)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000001c0)='nilfs2_segment_usage_check\x00', r5, 0x0, 0x7}, 0x18) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x110, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x9, 0x1, 0x4, 0x4009, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x800000, 0xfffffffc, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00'}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="0100002010ff"}) 152.323298ms ago: executing program 3 (id=5097): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r2}, &(0x7f00000002c0), &(0x7f0000000300)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x300, 0x0, 0xdb0, 0xf5ffffff}, 0x0) 0s ago: executing program 0 (id=5098): mkdir(&(0x7f0000000000)='./cgroup/../file0/file0/file0\x00', 0x42) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, 0x0, 0x0) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000e703533d1439f1d28a45357b93294df97cd30e8584a94aa4d6f914e40f38f82ac974aad050baec06978de673083032db899b71bf528f74f19e56287c9de9d6c31be4c1840ada998eca5f47f0b3"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r6}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="1b00000000000000000000000100000000000000", @ANYRES32, @ANYBLOB="00000000000000005298d7ae64bfa37aa62000e780ecfd8192637614b2675fca999cd597fb19898320a68cb6a7a09069e04a17272531fb82a39022b5fbbeac9b5297aecaa07bd141259db032bc4df463ee962859fba12ef0c16dc16ee1bf8551ad88424bbbb3191c1360995c2b1974cf19fdd45c0580d52819b3f1049f0680d71c7cbea4e0d430bbcf0f26d9a5c7304c019de97929b457be03fc6326f700"/168, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000040000000200"/28], 0x50) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x41008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240), 0x9) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) syz_clone(0x4080b000, 0x0, 0x0, &(0x7f0000000e40), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r6, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000200)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0xe, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000004c0), &(0x7f0000000580), 0x8, 0x24, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x3e) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.120' (ED25519) to the list of known hosts. [ 22.425573][ T24] audit: type=1400 audit(1745804634.960:66): avc: denied { mounton } for pid=274 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.426862][ T274] cgroup: Unknown subsys name 'net' [ 22.448496][ T24] audit: type=1400 audit(1745804634.960:67): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.475385][ T24] audit: type=1400 audit(1745804635.000:68): avc: denied { unmount } for pid=274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.475610][ T274] cgroup: Unknown subsys name 'devices' [ 22.673488][ T274] cgroup: Unknown subsys name 'hugetlb' [ 22.678903][ T274] cgroup: Unknown subsys name 'rlimit' [ 22.850013][ T24] audit: type=1400 audit(1745804635.380:69): avc: denied { setattr } for pid=274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.873018][ T24] audit: type=1400 audit(1745804635.380:70): avc: denied { mounton } for pid=274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.897653][ T24] audit: type=1400 audit(1745804635.380:71): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.904509][ T278] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.929300][ T24] audit: type=1400 audit(1745804635.470:72): avc: denied { relabelto } for pid=278 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.954529][ T24] audit: type=1400 audit(1745804635.470:73): avc: denied { write } for pid=278 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.986423][ T24] audit: type=1400 audit(1745804635.520:74): avc: denied { read } for pid=274 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.011745][ T24] audit: type=1400 audit(1745804635.520:75): avc: denied { open } for pid=274 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.037526][ T274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.005204][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.012212][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.019396][ T285] device bridge_slave_0 entered promiscuous mode [ 24.026355][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.033215][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.040409][ T285] device bridge_slave_1 entered promiscuous mode [ 24.089489][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.096386][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.103708][ T286] device bridge_slave_0 entered promiscuous mode [ 24.111141][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.118188][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.125384][ T286] device bridge_slave_1 entered promiscuous mode [ 24.166856][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.173918][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.180954][ T287] device bridge_slave_0 entered promiscuous mode [ 24.187722][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.194793][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.202009][ T287] device bridge_slave_1 entered promiscuous mode [ 24.269700][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.276861][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.284171][ T288] device bridge_slave_0 entered promiscuous mode [ 24.295272][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.302189][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.309278][ T288] device bridge_slave_1 entered promiscuous mode [ 24.324675][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.331549][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.338648][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.345446][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.393984][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.400930][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.408211][ T289] device bridge_slave_0 entered promiscuous mode [ 24.415151][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.422048][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.429203][ T289] device bridge_slave_1 entered promiscuous mode [ 24.491633][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.498490][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.505611][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.512413][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.534165][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.541018][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.548134][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.554932][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.566387][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.573787][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.580741][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.588048][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.595775][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.602930][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.610100][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.617576][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.646374][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.654401][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.661236][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.669128][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.677447][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.684322][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.713177][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.720586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.728466][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.736432][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.745040][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.751919][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.777043][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.784614][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.793054][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.800871][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.808275][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.816844][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.823691][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.831262][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.839176][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.847108][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.855138][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.861979][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.869137][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.877127][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.883968][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.912941][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.920533][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.928844][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.937384][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.945524][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.953148][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.961079][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.967838][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.975153][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.983243][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.990062][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.997303][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.005057][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.013199][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.020019][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.027305][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.035068][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.043097][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.049915][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.057534][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.065558][ T288] device veth0_vlan entered promiscuous mode [ 25.074439][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.082676][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.105713][ T288] device veth1_macvtap entered promiscuous mode [ 25.112936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.120857][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.129348][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.137345][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.145344][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.153248][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.161144][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.169117][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.176920][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.184919][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.192851][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.209059][ T287] device veth0_vlan entered promiscuous mode [ 25.218641][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.226426][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.234722][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.242966][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.251046][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.259176][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.267130][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.274654][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.281968][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.289127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.307340][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.315449][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.323747][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.332681][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.340734][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.349030][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.357174][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.364978][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.372926][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.380161][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.387658][ T285] device veth0_vlan entered promiscuous mode [ 25.396149][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.404588][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.413373][ T286] device veth0_vlan entered promiscuous mode [ 25.422108][ T289] device veth0_vlan entered promiscuous mode [ 25.435095][ T287] device veth1_macvtap entered promiscuous mode [ 25.442579][ T288] request_module fs-gadgetfs succeeded, but still no fs? [ 25.442772][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.458074][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.465866][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.473866][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.481091][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.494366][ T289] device veth1_macvtap entered promiscuous mode [ 25.501307][ T285] device veth1_macvtap entered promiscuous mode [ 25.509772][ T288] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 25.510247][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.528167][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.540911][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.549295][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.557777][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.565898][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.589887][ T286] device veth1_macvtap entered promiscuous mode [ 25.606375][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.615129][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.623983][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.632213][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.640385][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.648733][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.657040][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.665406][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.673734][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.682229][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.690406][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.701678][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.709907][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.718285][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.726662][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.755372][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.773784][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.791863][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.799984][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.891423][ C0] hrtimer: interrupt took 30701 ns [ 25.935644][ T330] syz.3.6[330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.935761][ T330] syz.3.6[330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.836032][ T366] device veth0_vlan left promiscuous mode [ 26.932400][ T366] device veth0_vlan entered promiscuous mode [ 27.034847][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.077784][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.160541][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.816351][ T405] cgroup: syz.4.23 (405) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 27.861871][ T405] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 27.885540][ T24] kauditd_printk_skb: 41 callbacks suppressed [ 27.885553][ T24] audit: type=1400 audit(1745804640.420:117): avc: denied { append } for pid=411 comm="syz.1.26" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.049226][ T24] audit: type=1400 audit(1745804640.580:118): avc: denied { ioctl } for pid=422 comm="syz.4.31" path="socket:[15791]" dev="sockfs" ino=15791 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.187921][ T424] device wg2 entered promiscuous mode [ 28.316496][ T24] audit: type=1400 audit(1745804640.850:119): avc: denied { create } for pid=434 comm="syz.4.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 28.340738][ T424] GPL: port 1(erspan0) entered blocking state [ 28.349146][ T424] GPL: port 1(erspan0) entered disabled state [ 28.359926][ T424] device erspan0 entered promiscuous mode [ 28.373163][ T416] GPL: port 1(erspan0) entered blocking state [ 28.379198][ T416] GPL: port 1(erspan0) entered forwarding state [ 28.488844][ T24] audit: type=1400 audit(1745804641.020:120): avc: denied { setopt } for pid=441 comm="syz.2.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.612792][ T451] device syzkaller0 entered promiscuous mode [ 29.305504][ T24] audit: type=1400 audit(1745804641.840:121): avc: denied { create } for pid=500 comm="syz.4.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 29.419325][ T24] audit: type=1400 audit(1745804641.910:122): avc: denied { write } for pid=506 comm="syz.3.54" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.455561][ T24] audit: type=1400 audit(1745804641.950:123): avc: denied { create } for pid=495 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 29.495412][ T24] audit: type=1400 audit(1745804641.980:124): avc: denied { create } for pid=509 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.523048][ T24] audit: type=1400 audit(1745804641.980:125): avc: denied { write } for pid=509 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.551117][ T24] audit: type=1400 audit(1745804642.020:126): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 30.381205][ T534] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.388268][ T534] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.399517][ T538] device pim6reg1 entered promiscuous mode [ 30.560606][ T534] device syzkaller0 entered promiscuous mode [ 30.587219][ T534] device bridge_slave_1 left promiscuous mode [ 30.599825][ T534] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.608371][ T534] device bridge_slave_0 left promiscuous mode [ 30.615258][ T534] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.837291][ T599] device veth0_to_team entered promiscuous mode [ 31.879055][ T602] bridge0: port 3(veth0) entered blocking state [ 31.886418][ T602] bridge0: port 3(veth0) entered disabled state [ 31.907941][ T602] device veth0 entered promiscuous mode [ 31.918202][ T602] bridge0: port 3(veth0) entered blocking state [ 31.924641][ T602] bridge0: port 3(veth0) entered forwarding state [ 33.526866][ T24] kauditd_printk_skb: 7 callbacks suppressed [ 33.526879][ T24] audit: type=1400 audit(1745804646.060:134): avc: denied { write } for pid=642 comm="syz.0.95" name="cgroup.subtree_control" dev="cgroup2" ino=209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 33.708753][ T24] audit: type=1400 audit(1745804646.130:135): avc: denied { open } for pid=642 comm="syz.0.95" path="" dev="cgroup2" ino=209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 36.847689][ T706] ^S­µ: renamed from pim6reg1 [ 38.756327][ T743] device syzkaller0 entered promiscuous mode [ 38.882963][ T24] audit: type=1400 audit(1745804651.420:136): avc: denied { create } for pid=741 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 42.015034][ T788] device syzkaller0 entered promiscuous mode [ 42.291011][ T795] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 42.677639][ T24] audit: type=1400 audit(1745804655.210:137): avc: denied { create } for pid=804 comm="syz.3.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 42.715563][ T805] GPL: port 1(dummy0) entered blocking state [ 42.737495][ T805] GPL: port 1(dummy0) entered disabled state [ 42.782344][ T805] device dummy0 entered promiscuous mode [ 42.832100][ T808] device dummy0 left promiscuous mode [ 42.882106][ T808] GPL: port 1(dummy0) entered disabled state [ 43.742922][ T24] audit: type=1400 audit(1745804656.280:138): avc: denied { create } for pid=834 comm="syz.4.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 47.954679][ T911] device syzkaller0 entered promiscuous mode [ 50.404352][ T945] device pim6reg1 entered promiscuous mode [ 51.252128][ T956] device syzkaller0 entered promiscuous mode [ 51.687573][ T979] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.694661][ T979] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.802434][ T975] device bridge_slave_1 left promiscuous mode [ 51.809569][ T975] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.861361][ T975] device bridge_slave_0 left promiscuous mode [ 51.868469][ T975] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.980674][ T981] device sit0 entered promiscuous mode [ 52.198920][ T989] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.543245][ T24] audit: type=1400 audit(1745804667.080:139): avc: denied { ioctl } for pid=1013 comm="syz.2.192" path="socket:[17303]" dev="sockfs" ino=17303 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 55.045747][ C1] Illegal XDP return value 16128, expect packet loss! [ 57.249661][ T24] audit: type=1400 audit(1745804669.770:140): avc: denied { create } for pid=1074 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 59.790238][ T1109] device wg2 entered promiscuous mode [ 59.930406][ T24] audit: type=1400 audit(1745804672.460:141): avc: denied { create } for pid=1111 comm="syz.3.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 60.117561][ T24] audit: type=1400 audit(1745804672.650:142): avc: denied { create } for pid=1119 comm="syz.2.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 60.262980][ T1121] device syzkaller0 entered promiscuous mode [ 60.564716][ T1138] bridge0: port 3(veth0) entered disabled state [ 60.571357][ T1138] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.579755][ T1138] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.974787][ T24] audit: type=1400 audit(1745804674.510:143): avc: denied { create } for pid=1166 comm="syz.0.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 64.901747][ T1212] device wg2 left promiscuous mode [ 65.592868][ T24] audit: type=1400 audit(1745804678.130:144): avc: denied { create } for pid=1220 comm="syz.0.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 66.329396][ T1239] device sit0 entered promiscuous mode [ 66.451335][ T1239] device veth1_macvtap left promiscuous mode [ 67.763800][ T24] audit: type=1400 audit(1745804680.300:145): avc: denied { create } for pid=1252 comm="syz.4.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 69.281836][ T1274] device veth0_vlan left promiscuous mode [ 69.287724][ T1274] device veth0_vlan entered promiscuous mode [ 69.342698][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.363298][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.391803][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 70.044745][ T1288] device syzkaller0 entered promiscuous mode [ 71.057396][ T1295] device wg2 entered promiscuous mode [ 71.811723][ T24] audit: type=1400 audit(1745804684.320:146): avc: denied { create } for pid=1314 comm="syz.4.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 72.283733][ T1324] device sit0 entered promiscuous mode [ 73.881679][ T24] audit: type=1400 audit(1745804686.410:147): avc: denied { create } for pid=1348 comm="syz.2.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 76.189853][ T24] audit: type=1400 audit(1745804688.720:148): avc: denied { create } for pid=1384 comm="syz.0.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 76.242089][ T1379] device syzkaller0 entered promiscuous mode [ 76.971406][ T24] audit: type=1400 audit(1745804689.500:149): avc: denied { create } for pid=1406 comm="syz.2.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 78.210114][ T1429] device wg2 entered promiscuous mode [ 83.741543][ T1475] device veth0_vlan left promiscuous mode [ 83.747500][ T1475] device veth0_vlan entered promiscuous mode [ 83.773993][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.792667][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.831856][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.122701][ T1483] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 84.181458][ T1483] device syzkaller0 entered promiscuous mode [ 86.992916][ T24] audit: type=1400 audit(1745804699.520:150): avc: denied { create } for pid=1527 comm="syz.1.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 87.232646][ T1528] device syzkaller0 entered promiscuous mode [ 87.822686][ T1542] FAULT_INJECTION: forcing a failure. [ 87.822686][ T1542] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 87.910555][ T1542] CPU: 1 PID: 1542 Comm: syz.3.341 Not tainted 5.10.236-syzkaller #0 [ 87.918455][ T1542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 87.928359][ T1542] Call Trace: [ 87.931495][ T1542] __dump_stack+0x21/0x24 [ 87.935643][ T1542] dump_stack_lvl+0x169/0x1d8 [ 87.940155][ T1542] ? thaw_kernel_threads+0x220/0x220 [ 87.945278][ T1542] ? show_regs_print_info+0x18/0x18 [ 87.950315][ T1542] ? slab_post_alloc_hook+0x7d/0x2f0 [ 87.955433][ T1542] dump_stack+0x15/0x1c [ 87.959421][ T1542] should_fail+0x3c1/0x510 [ 87.963676][ T1542] should_fail_usercopy+0x1a/0x20 [ 87.968536][ T1542] _copy_from_iter_full+0x1ac/0x750 [ 87.973576][ T1542] ? __check_object_size+0x2f4/0x3c0 [ 87.978693][ T1542] tipc_msg_build+0x874/0xc90 [ 87.983211][ T1542] __tipc_sendmsg+0x1a14/0x2be0 [ 87.987895][ T1542] ? tipc_sk_publish+0x3f0/0x3f0 [ 87.992674][ T1542] ? avc_has_perm+0x234/0x360 [ 87.997182][ T1542] ? wait_woken+0x180/0x180 [ 88.001517][ T1542] ? __kasan_check_write+0x14/0x20 [ 88.006467][ T1542] ? _raw_spin_lock_bh+0x8e/0xe0 [ 88.011252][ T1542] ? _raw_spin_lock_irq+0xe0/0xe0 [ 88.016108][ T1542] ? __local_bh_enable_ip+0x53/0x80 [ 88.021145][ T1542] ? local_bh_enable+0x1f/0x30 [ 88.025739][ T1542] ? lock_sock_nested+0x1f5/0x290 [ 88.030589][ T1542] ? sock_init_data+0xc0/0xc0 [ 88.035108][ T1542] ? kasan_set_track+0x5b/0x70 [ 88.039709][ T1542] ? kasan_set_track+0x4a/0x70 [ 88.044310][ T1542] tipc_sendmsg+0x55/0x70 [ 88.048476][ T1542] ? tipc_recvmsg+0x13a0/0x13a0 [ 88.053163][ T1542] ____sys_sendmsg+0x5a2/0x8c0 [ 88.057761][ T1542] ? __sys_sendmsg_sock+0x40/0x40 [ 88.062631][ T1542] ? import_iovec+0x7c/0xb0 [ 88.066958][ T1542] ___sys_sendmsg+0x1f0/0x260 [ 88.071469][ T1542] ? __sys_sendmsg+0x250/0x250 [ 88.076068][ T1542] ? rw_verify_area+0x1c0/0x360 [ 88.080759][ T1542] ? __fdget+0x1a1/0x230 [ 88.084838][ T1542] __x64_sys_sendmsg+0x1e2/0x2a0 [ 88.089605][ T1542] ? fput+0x1a/0x20 [ 88.093252][ T1542] ? ___sys_sendmsg+0x260/0x260 [ 88.097942][ T1542] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 88.103845][ T1542] do_syscall_64+0x31/0x40 [ 88.108092][ T1542] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 88.113817][ T1542] RIP: 0033:0x7f5d09e2a969 [ 88.118072][ T1542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 88.137511][ T1542] RSP: 002b:00007f5d08493038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 88.145772][ T1542] RAX: ffffffffffffffda RBX: 00007f5d0a051fa0 RCX: 00007f5d09e2a969 [ 88.153566][ T1542] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 88.161381][ T1542] RBP: 00007f5d08493090 R08: 0000000000000000 R09: 0000000000000000 [ 88.169306][ T1542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 88.177127][ T1542] R13: 0000000000000000 R14: 00007f5d0a051fa0 R15: 00007fff32fa57f8 [ 90.407376][ T1611] device syzkaller0 entered promiscuous mode [ 91.570326][ T1635] device pim6reg1 entered promiscuous mode [ 92.294023][ T1667] device pim6reg1 entered promiscuous mode [ 92.881503][ T1675] device sit0 left promiscuous mode [ 96.827124][ T24] audit: type=1400 audit(1745804709.360:151): avc: denied { create } for pid=1722 comm="syz.2.384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 100.332916][ T1780] device sit0 entered promiscuous mode [ 101.990154][ T1803] device sit0 left promiscuous mode [ 104.284512][ T24] audit: type=1400 audit(1745804716.820:152): avc: denied { read } for pid=1837 comm="syz.4.412" name="cgroup.subtree_control" dev="cgroup2" ino=233 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 104.406893][ T24] audit: type=1400 audit(1745804716.940:153): avc: denied { tracepoint } for pid=1837 comm="syz.4.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 105.370260][ T1850] device sit0 left promiscuous mode [ 105.462919][ T24] audit: type=1400 audit(1745804718.000:154): avc: denied { create } for pid=1849 comm="syz.0.416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 105.478536][ T1850] device sit0 entered promiscuous mode [ 105.664480][ T1853] device pim6reg1 entered promiscuous mode [ 105.796511][ T287] cgroup: fork rejected by pids controller in /syz0 [ 105.806972][ T1856] FAULT_INJECTION: forcing a failure. [ 105.806972][ T1856] name failslab, interval 1, probability 0, space 0, times 1 [ 105.891420][ T1856] CPU: 0 PID: 1856 Comm: syz.1.419 Not tainted 5.10.236-syzkaller #0 [ 105.899320][ T1856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 105.909208][ T1856] Call Trace: [ 105.912354][ T1856] __dump_stack+0x21/0x24 [ 105.916513][ T1856] dump_stack_lvl+0x169/0x1d8 [ 105.921022][ T1856] ? show_regs_print_info+0x18/0x18 [ 105.926047][ T1856] dump_stack+0x15/0x1c [ 105.930034][ T1856] should_fail+0x3c1/0x510 [ 105.934289][ T1856] ? __alloc_skb+0x9e/0x520 [ 105.938627][ T1856] __should_failslab+0xa4/0xe0 [ 105.943227][ T1856] should_failslab+0x9/0x20 [ 105.947568][ T1856] kmem_cache_alloc+0x3d/0x2e0 [ 105.952177][ T1856] ? kfree+0xc0/0x270 [ 105.955987][ T1856] __alloc_skb+0x9e/0x520 [ 105.960152][ T1856] ? __kasan_slab_free+0x11/0x20 [ 105.964926][ T1856] __pskb_copy_fclone+0xa6/0xf70 [ 105.969701][ T1856] ? kfree+0xc0/0x270 [ 105.973520][ T1856] ? tipc_nametbl_mc_lookup+0x1ee/0xb10 [ 105.978905][ T1856] ? tipc_dest_pop+0x1e4/0x280 [ 105.983497][ T1856] tipc_sk_mcast_rcv+0x5b6/0xf00 [ 105.988292][ T1856] ? tsk_set_importance+0x180/0x180 [ 105.993318][ T1856] tipc_mcast_xmit+0x10fd/0x1710 [ 105.998080][ T1856] ? iov_iter_advance+0x2a6/0x750 [ 106.002940][ T1856] ? tipc_msg_build+0xd0/0xc90 [ 106.007543][ T1856] ? tipc_bcbase_xmit+0x9d0/0x9d0 [ 106.012402][ T1856] ? _copy_from_iter_full+0x276/0x750 [ 106.017607][ T1856] ? __kasan_check_write+0x14/0x20 [ 106.022556][ T1856] ? __alloc_skb+0x38b/0x520 [ 106.026982][ T1856] ? __check_object_size+0x8e/0x3c0 [ 106.032013][ T1856] ? tipc_msg_build+0x40b/0xc90 [ 106.036699][ T1856] ? _raw_spin_lock_bh+0x8e/0xe0 [ 106.041486][ T1856] ? __local_bh_enable_ip+0x53/0x80 [ 106.046508][ T1856] ? tipc_nametbl_lookup_dst_nodes+0x375/0x7c0 [ 106.052498][ T1856] __tipc_sendmsg+0x1d69/0x2be0 [ 106.057188][ T1856] ? tipc_sk_publish+0x3f0/0x3f0 [ 106.061962][ T1856] ? avc_has_perm+0x234/0x360 [ 106.066480][ T1856] ? wait_woken+0x180/0x180 [ 106.070813][ T1856] ? __kasan_check_write+0x14/0x20 [ 106.075760][ T1856] ? _raw_spin_lock_bh+0x8e/0xe0 [ 106.080533][ T1856] ? _raw_spin_lock_irq+0xe0/0xe0 [ 106.085413][ T1856] ? __local_bh_enable_ip+0x53/0x80 [ 106.090540][ T1856] ? local_bh_enable+0x1f/0x30 [ 106.095140][ T1856] ? lock_sock_nested+0x1f5/0x290 [ 106.100002][ T1856] ? sock_init_data+0xc0/0xc0 [ 106.104518][ T1856] ? kasan_set_track+0x5b/0x70 [ 106.109114][ T1856] ? kasan_set_track+0x4a/0x70 [ 106.113715][ T1856] tipc_sendmsg+0x55/0x70 [ 106.117904][ T1856] ? tipc_recvmsg+0x13a0/0x13a0 [ 106.122575][ T1856] ____sys_sendmsg+0x5a2/0x8c0 [ 106.127178][ T1856] ? __sys_sendmsg_sock+0x40/0x40 [ 106.132047][ T1856] ? import_iovec+0x7c/0xb0 [ 106.136382][ T1856] ___sys_sendmsg+0x1f0/0x260 [ 106.140886][ T1856] ? __sys_sendmsg+0x250/0x250 [ 106.145479][ T1856] ? rw_verify_area+0x1c0/0x360 [ 106.150173][ T1856] ? __fdget+0x1a1/0x230 [ 106.154246][ T1856] __x64_sys_sendmsg+0x1e2/0x2a0 [ 106.159019][ T1856] ? fput+0x1a/0x20 [ 106.162680][ T1856] ? ___sys_sendmsg+0x260/0x260 [ 106.167369][ T1856] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 106.173262][ T1856] do_syscall_64+0x31/0x40 [ 106.177639][ T1856] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 106.183364][ T1856] RIP: 0033:0x7f9df2519969 [ 106.187620][ T1856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 106.207059][ T1856] RSP: 002b:00007f9df0b82038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 106.215305][ T1856] RAX: ffffffffffffffda RBX: 00007f9df2740fa0 RCX: 00007f9df2519969 [ 106.223127][ T1856] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 106.231016][ T1856] RBP: 00007f9df0b82090 R08: 0000000000000000 R09: 0000000000000000 [ 106.238827][ T1856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.246633][ T1856] R13: 0000000000000000 R14: 00007f9df2740fa0 R15: 00007fff82bfcac8 [ 106.301496][ T1856] tipc: Failed to clone mcast rcv buffer [ 106.742899][ T1898] device veth1_macvtap left promiscuous mode [ 106.748728][ T1898] device macsec0 entered promiscuous mode [ 106.816193][ T1904] device veth1_macvtap entered promiscuous mode [ 106.934570][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 107.375490][ T1901] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.410519][ T1901] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.418183][ T1901] device bridge_slave_0 entered promiscuous mode [ 107.425295][ T1901] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.432425][ T1901] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.448993][ T1901] device bridge_slave_1 entered promiscuous mode [ 108.079532][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 108.094962][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.125890][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 108.158197][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.189599][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.196520][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.334004][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 108.382179][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 108.397898][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.406173][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.413052][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.617855][ T1950] device syzkaller0 entered promiscuous mode [ 108.643679][ T1901] device veth0_vlan entered promiscuous mode [ 108.650455][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.662708][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.670885][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.679355][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.687527][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.696047][ T1960] FAULT_INJECTION: forcing a failure. [ 108.696047][ T1960] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 108.709061][ T1960] CPU: 0 PID: 1960 Comm: syz.1.445 Not tainted 5.10.236-syzkaller #0 [ 108.716945][ T1960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 108.727274][ T1960] Call Trace: [ 108.730426][ T1960] __dump_stack+0x21/0x24 [ 108.734567][ T1960] dump_stack_lvl+0x169/0x1d8 [ 108.739077][ T1960] ? thaw_kernel_threads+0x220/0x220 [ 108.744197][ T1960] ? vsnprintf+0x1871/0x1960 [ 108.748628][ T1960] ? show_regs_print_info+0x18/0x18 [ 108.753668][ T1960] dump_stack+0x15/0x1c [ 108.757664][ T1960] should_fail+0x3c1/0x510 [ 108.761912][ T1960] should_fail_usercopy+0x1a/0x20 [ 108.766769][ T1960] _copy_to_user+0x20/0x90 [ 108.771020][ T1960] simple_read_from_buffer+0xe9/0x160 [ 108.776234][ T1960] proc_fail_nth_read+0x19a/0x210 [ 108.781082][ T1960] ? proc_fault_inject_write+0x2f0/0x2f0 [ 108.786663][ T1960] ? rw_verify_area+0x1c0/0x360 [ 108.791324][ T1960] ? proc_fault_inject_write+0x2f0/0x2f0 [ 108.796791][ T1960] vfs_read+0x1fe/0xa10 [ 108.800790][ T1960] ? kernel_read+0x70/0x70 [ 108.805042][ T1960] ? __kasan_check_write+0x14/0x20 [ 108.809983][ T1960] ? mutex_lock+0x8c/0xe0 [ 108.814153][ T1960] ? mutex_trylock+0xa0/0xa0 [ 108.818669][ T1960] ? __fget_files+0x2c4/0x320 [ 108.823182][ T1960] ? __fdget_pos+0x2d2/0x380 [ 108.827602][ T1960] ? ksys_read+0x71/0x240 [ 108.831774][ T1960] ksys_read+0x140/0x240 [ 108.835851][ T1960] ? vfs_write+0xd60/0xd60 [ 108.840104][ T1960] __x64_sys_read+0x7b/0x90 [ 108.844445][ T1960] do_syscall_64+0x31/0x40 [ 108.848700][ T1960] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 108.854423][ T1960] RIP: 0033:0x7f9df251837c [ 108.858677][ T1960] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 108.878118][ T1960] RSP: 002b:00007f9df0b82030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 108.886362][ T1960] RAX: ffffffffffffffda RBX: 00007f9df2740fa0 RCX: 00007f9df251837c [ 108.894181][ T1960] RDX: 000000000000000f RSI: 00007f9df0b820a0 RDI: 0000000000000008 [ 108.901989][ T1960] RBP: 00007f9df0b82090 R08: 0000000000000000 R09: 0000000000000000 [ 108.909795][ T1960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 108.917607][ T1960] R13: 0000000000000000 R14: 00007f9df2740fa0 R15: 00007fff82bfcac8 [ 108.937923][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.087178][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 109.111885][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.174618][ T1901] device veth1_macvtap entered promiscuous mode [ 109.267103][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 109.280236][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 109.312733][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 109.343996][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 109.380537][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 109.487875][ T1978] device wg2 left promiscuous mode [ 109.543215][ T24] audit: type=1400 audit(1745804722.080:155): avc: denied { mounton } for pid=1901 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 109.775864][ T1978] device syzkaller0 entered promiscuous mode [ 109.792248][ T1989] €Â0: renamed from pim6reg1 [ 111.529285][ T2063] device pim6reg1 entered promiscuous mode [ 112.100209][ T2098] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.109780][ T2098] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.333423][ T24] audit: type=1400 audit(1745804725.870:156): avc: denied { setattr } for pid=2164 comm="syz.4.498" path="/dev/ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 114.433384][ T24] audit: type=1400 audit(1745804726.970:157): avc: denied { remove_name } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 114.561505][ T24] audit: type=1400 audit(1745804726.970:158): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 116.685610][ T2268] device pim6reg1 entered promiscuous mode [ 117.341463][ T2283] ^S­µ: renamed from pim6reg1 [ 118.382402][ T24] audit: type=1400 audit(1745804730.920:159): avc: denied { create } for pid=2338 comm="syz.0.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 119.602846][ T2373] device pim6reg1 entered promiscuous mode [ 119.805511][ T2384] syz.0.556[2384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.806403][ T2384] syz.0.556[2384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.332742][ T2450] syz.2.572[2450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.351136][ T2450] syz.2.572[2450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.510538][ T2455] device veth0_vlan left promiscuous mode [ 123.528113][ T2455] device veth0_vlan entered promiscuous mode [ 123.580720][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.589250][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.597889][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 124.376631][ T24] audit: type=1400 audit(1745804736.910:160): avc: denied { create } for pid=2496 comm="syz.2.585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 124.692336][ T24] audit: type=1400 audit(1745804737.230:161): avc: denied { append } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 124.863699][ T24] audit: type=1400 audit(1745804737.230:162): avc: denied { open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 125.162275][ T24] audit: type=1400 audit(1745804737.230:163): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 125.290561][ T24] audit: type=1400 audit(1745804737.700:164): avc: denied { ioctl } for pid=2524 comm="syz.2.594" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 125.709031][ T2560] device syzkaller0 entered promiscuous mode [ 126.180242][ T24] audit: type=1400 audit(1745804738.710:165): avc: denied { create } for pid=2595 comm="syz.4.614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 127.848353][ T2636] device syzkaller0 entered promiscuous mode [ 128.500912][ T2668] device syzkaller0 entered promiscuous mode [ 129.617251][ T2739] device syzkaller0 entered promiscuous mode [ 129.674355][ T2743] device syzkaller0 entered promiscuous mode [ 130.563451][ T2750] device pim6reg1 entered promiscuous mode [ 130.875836][ T2780] syz.2.664[2780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.875899][ T2780] syz.2.664[2780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.193662][ T2795] device wg2 left promiscuous mode [ 132.109474][ T2821] device pim6reg1 entered promiscuous mode [ 132.409421][ T2823] device sit0 entered promiscuous mode [ 134.142839][ T2913] device veth0_vlan left promiscuous mode [ 134.160350][ T2913] device veth0_vlan entered promiscuous mode [ 136.424281][ T3040] device syzkaller0 entered promiscuous mode [ 136.447628][ T3040] device wg2 entered promiscuous mode [ 136.648606][ T3058] device pim6reg1 entered promiscuous mode [ 138.107041][ T3144] device veth1_macvtap left promiscuous mode [ 138.155304][ T3144] device macsec0 entered promiscuous mode [ 138.510179][ T3162] tap0: tun_chr_ioctl cmd 2147767506 [ 138.699800][ T3162] tap0: tun_chr_ioctl cmd 35108 [ 139.026373][ T3183] device pim6reg1 entered promiscuous mode [ 139.408818][ T3208] device syzkaller0 entered promiscuous mode [ 141.081265][ T3274] device pim6reg1 entered promiscuous mode [ 141.209693][ T3281] device sit0 left promiscuous mode [ 141.292050][ T3282] device sit0 entered promiscuous mode [ 141.787666][ T24] audit: type=1400 audit(1745804754.320:166): avc: denied { create } for pid=3300 comm="syz.3.814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 142.450817][ T3315] device veth0_vlan left promiscuous mode [ 142.456848][ T3315] device veth0_vlan entered promiscuous mode [ 142.472939][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.483163][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.490601][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.507641][ T3321] p: renamed from pim6reg1 [ 143.173613][ T24] audit: type=1400 audit(1745804755.710:167): avc: denied { create } for pid=3372 comm="syz.2.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 144.331664][ T3440] @ÿ: renamed from bond_slave_0 [ 145.323499][ T3488] device pim6reg1 entered promiscuous mode [ 145.836284][ T24] audit: type=1400 audit(1745804758.370:168): avc: denied { create } for pid=3508 comm="syz.0.875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 146.608386][ T3549] device syzkaller0 entered promiscuous mode [ 148.803608][ T3599] device syzkaller0 entered promiscuous mode [ 152.588653][ T3689] device pim6reg1 entered promiscuous mode [ 152.663588][ T24] audit: type=1400 audit(1745804765.200:169): avc: denied { create } for pid=3695 comm="syz.0.923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 154.880623][ T3771] device veth0_vlan left promiscuous mode [ 154.904381][ T3771] device veth0_vlan entered promiscuous mode [ 154.982073][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.990322][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.998877][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.230737][ T3803] sock: sock_set_timeout: `syz.0.951' (pid 3803) tries to set negative timeout [ 155.536832][ T3807] cgroup: fork rejected by pids controller in /syz4 [ 156.183733][ T3940] device pim6reg1 entered promiscuous mode [ 156.896995][ T3964] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.909333][ T3964] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.920060][ T3964] device bridge_slave_0 entered promiscuous mode [ 156.939576][ T3964] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.955285][ T3964] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.966837][ T3964] device bridge_slave_1 entered promiscuous mode [ 157.073984][ T3964] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.080880][ T3964] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.087999][ T3964] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.094860][ T3964] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.121053][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.129090][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.136944][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.154203][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.162674][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.170743][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.177620][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.185520][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.194288][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.202902][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.209775][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.228222][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.242854][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.253032][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.261457][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.282323][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 157.291083][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 157.302347][ T3964] device veth0_vlan entered promiscuous mode [ 157.319966][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 157.328359][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 157.344524][ T385] device bridge_slave_1 left promiscuous mode [ 157.350488][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.359191][ T385] device bridge_slave_0 left promiscuous mode [ 157.365446][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.374597][ T385] device veth0_vlan left promiscuous mode [ 157.509693][ T3964] device veth1_macvtap entered promiscuous mode [ 157.517714][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 157.526018][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 157.552763][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 157.562077][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 157.570190][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 157.610333][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 157.627089][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 157.652772][ T4001] device wg2 entered promiscuous mode [ 157.665948][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 157.674383][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 157.703665][ T4007] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.710790][ T4007] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.024688][ T4003] device bridge_slave_1 left promiscuous mode [ 158.100312][ T4003] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.150185][ T4003] device bridge_slave_0 left promiscuous mode [ 158.158072][ T4003] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.348258][ T4011] device syzkaller0 entered promiscuous mode [ 158.596116][ T4048] device veth1_macvtap left promiscuous mode [ 158.602169][ T4048] device macsec0 entered promiscuous mode [ 158.675180][ T4051] device pim6reg1 entered promiscuous mode [ 158.724062][ T4041] device veth1_macvtap left promiscuous mode [ 158.751499][ T4041] device macsec0 entered promiscuous mode [ 158.949068][ T4059] device veth0_vlan left promiscuous mode [ 158.961097][ T4059] device veth0_vlan entered promiscuous mode [ 158.980939][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.023508][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.062259][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.756097][ T4085] device syzkaller0 entered promiscuous mode [ 162.195854][ T24] audit: type=1400 audit(1745804774.730:170): avc: denied { create } for pid=4185 comm="syz.4.1026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 165.552842][ T4279] device wg2 left promiscuous mode [ 165.870348][ T4293] device vxcan1 entered promiscuous mode [ 166.389096][ T4293] device syzkaller0 entered promiscuous mode [ 168.033950][ T4351] device pim6reg1 entered promiscuous mode [ 168.170455][ T4362] syz.2.1072[4362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.170514][ T4362] syz.2.1072[4362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.201877][ T4402] device sit0 left promiscuous mode [ 171.684800][ T4459] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.693625][ T4459] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.790100][ T4462] device bridge_slave_1 left promiscuous mode [ 171.825051][ T4462] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.871955][ T4462] device bridge_slave_0 left promiscuous mode [ 171.885373][ T4462] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.986084][ T4572] syz.2.1128[4572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.986141][ T4572] syz.2.1128[4572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.040094][ T4575] syz.2.1128[4575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.074017][ T4575] syz.2.1128[4575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.398624][ T24] audit: type=1400 audit(1745804786.930:171): avc: denied { attach_queue } for pid=4591 comm="syz.2.1133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 175.452815][ T4622] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.459766][ T4622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.466903][ T4622] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.473679][ T4622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.481047][ T4622] device bridge0 entered promiscuous mode [ 175.747221][ T4637] device wg2 entered promiscuous mode [ 175.797464][ T4637] device syzkaller0 entered promiscuous mode [ 176.055843][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.515810][ T4680] ÿ: renamed from bond_slave_0 [ 176.780628][ T4691] dvmrp1: tun_chr_ioctl cmd 35139 [ 176.920889][ T4715] device syzkaller0 entered promiscuous mode [ 177.095567][ T4718] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 177.203365][ T4725] device veth0_vlan left promiscuous mode [ 177.234115][ T4725] device veth0_vlan entered promiscuous mode [ 177.358474][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.397858][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.407345][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.501163][ T4736] 7B’ç÷ï: renamed from syzkaller0 [ 178.588691][ T4781] device syzkaller0 entered promiscuous mode [ 178.602144][ T4784] device pim6reg1 entered promiscuous mode [ 178.826656][ T4806] syz.3.1195[4806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.826712][ T4806] syz.3.1195[4806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.512741][ T4851] device pim6reg1 entered promiscuous mode [ 180.184964][ T4907] syz.0.1220[4907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.185052][ T4907] syz.0.1220[4907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.252898][ T4896] device wg2 left promiscuous mode [ 180.273292][ T4896] syz.0.1220[4896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.273379][ T4896] syz.0.1220[4896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.287380][ T4896] device wg2 entered promiscuous mode [ 180.371260][ T4925] syz.0.1229[4925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.371974][ T4925] syz.0.1229[4925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.739475][ T4939] device sit0 entered promiscuous mode [ 181.872644][ T5006] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 181.878986][ T5006] pim6reg0: linktype set to 769 [ 184.319137][ T5098] device vlan0 entered promiscuous mode [ 185.365719][ T5130] device sit0 entered promiscuous mode [ 187.146048][ T24] audit: type=1400 audit(1745804799.680:172): avc: denied { create } for pid=5309 comm="syz.3.1336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 190.359516][ T5462] device pim6reg1 entered promiscuous mode [ 190.470800][ T5465] device pim6reg1 entered promiscuous mode [ 192.521606][ T5547] device pim6reg1 entered promiscuous mode [ 193.245968][ T5588] syz.4.1411[5588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.251001][ T5588] syz.4.1411[5588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.979236][ T5638] ------------[ cut here ]------------ [ 194.034176][ T5638] trace type BPF program uses run-time allocation [ 194.043268][ T5638] WARNING: CPU: 0 PID: 5638 at kernel/bpf/verifier.c:10496 check_map_prog_compatibility+0x5d6/0x740 [ 194.091479][ T5638] Modules linked in: [ 194.111445][ T5638] CPU: 0 PID: 5638 Comm: syz.2.1416 Not tainted 5.10.236-syzkaller #0 [ 194.131567][ T5638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 194.151448][ T5638] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 194.168292][ T5638] Code: 85 e9 14 fe ff ff e8 49 ff ef ff 31 c0 e9 15 fe ff ff e8 3d ff ef ff c6 05 53 ac 2c 05 01 48 c7 c7 40 67 05 85 e8 fa 21 f8 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 194.241331][ T5638] RSP: 0018:ffffc90001f7f468 EFLAGS: 00010246 [ 194.254065][ T5638] RAX: 72c78c2caa8edc00 RBX: 0000000000000001 RCX: 0000000000080000 [ 194.285404][ T5638] RDX: ffffc90002d01000 RSI: 00000000000009a5 RDI: 00000000000009a6 [ 194.317512][ T5638] RBP: ffffc90001f7f4b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 194.340500][ T5638] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff888110460000 [ 194.363074][ T5638] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888113122000 [ 194.372099][ T5638] FS: 00007eff986756c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 194.381004][ T5638] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 194.396181][ T5638] CR2: 0000000000000000 CR3: 0000000131447000 CR4: 00000000003506b0 [ 194.408564][ T5638] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 194.446242][ T5638] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 194.476833][ T5638] Call Trace: [ 194.501426][ T5638] ? __fdget+0x1a1/0x230 [ 194.505570][ T5638] resolve_pseudo_ldimm64+0x526/0x1020 [ 194.530774][ T5638] ? bpf_check+0xd720/0xd720 [ 194.545634][ T5638] ? kvmalloc_node+0x88/0x130 [ 194.562420][ T5638] bpf_check+0x8db4/0xd720 [ 194.589995][ T5638] ? bpf_get_btf_vmlinux+0x60/0x60 [ 194.601821][ T5638] ? 0xffffffffa000297c [ 194.620386][ T5638] ? is_bpf_text_address+0x177/0x190 [ 194.666323][ T5638] ? selinux_bpf_prog_alloc+0x51/0x140 [ 194.689399][ T5638] ? __kernel_text_address+0xa0/0x100 [ 194.701453][ T5638] ? unwind_get_return_address+0x4d/0x90 [ 194.706961][ T5638] ? stack_trace_save+0xe0/0xe0 [ 194.755325][ T5638] ? arch_stack_walk+0xee/0x140 [ 194.780758][ T5638] ? stack_trace_save+0x98/0xe0 [ 194.870173][ T5638] ? stack_trace_snprint+0xf0/0xf0 [ 194.964682][ T5638] ? __kasan_slab_alloc+0x69/0xf0 [ 195.001473][ T5638] ? pcpu_block_update+0x3ec/0x900 [ 195.006463][ T5638] ? selinux_bpf_prog_alloc+0x51/0x140 [ 195.112986][ T5638] ? __kasan_kmalloc+0xec/0x110 [ 195.142016][ T5638] ? __kasan_kmalloc+0xda/0x110 [ 195.146730][ T5638] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 195.202159][ T5638] ? selinux_bpf_prog_alloc+0x51/0x140 [ 195.207467][ T5638] ? security_bpf_prog_alloc+0x62/0x90 [ 195.259067][ T5638] ? bpf_prog_load+0x949/0x1420 [ 195.293438][ T5638] ? __se_sys_bpf+0x442/0x680 [ 195.297957][ T5638] ? __x64_sys_bpf+0x7b/0x90 [ 195.331436][ T5638] ? do_syscall_64+0x31/0x40 [ 195.335882][ T5638] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 195.401462][ T5638] ? memset+0x35/0x40 [ 195.453422][ T5638] ? bpf_obj_name_cpy+0x193/0x1e0 [ 195.476307][ T5638] bpf_prog_load+0xf5a/0x1420 [ 195.480839][ T5638] ? map_freeze+0x320/0x320 [ 195.486212][ T5638] ? slab_free_freelist_hook+0xc5/0x190 [ 195.491822][ T5638] ? selinux_bpf+0xc7/0xf0 [ 195.496083][ T5638] ? security_bpf+0x82/0xa0 [ 195.500428][ T5638] __se_sys_bpf+0x442/0x680 [ 195.505068][ T5638] ? __x64_sys_bpf+0x90/0x90 [ 195.509496][ T5638] ? fpu__clear_all+0x20/0x20 [ 195.551393][ T5638] __x64_sys_bpf+0x7b/0x90 [ 195.555684][ T5638] do_syscall_64+0x31/0x40 [ 195.559940][ T5638] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 195.651782][ T5638] RIP: 0033:0x7eff9a00c969 [ 195.656300][ T5638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.778733][ T5638] RSP: 002b:00007eff98675038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 195.816363][ T5638] RAX: ffffffffffffffda RBX: 00007eff9a233fa0 RCX: 00007eff9a00c969 [ 195.846682][ T5638] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 195.890392][ T5638] RBP: 00007eff9a08eab1 R08: 0000000000000000 R09: 0000000000000000 [ 195.917151][ T5638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 195.947055][ T5638] R13: 0000000000000000 R14: 00007eff9a233fa0 R15: 00007ffc060b88b8 [ 195.979565][ T5638] ---[ end trace 14c603d5dae180f1 ]--- [ 196.028157][ T5706] syz.2.1433[5706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.028214][ T5706] syz.2.1433[5706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.083855][ T5700] device wg2 left promiscuous mode [ 197.073784][ T5755] 7B’ç÷ï: renamed from syzkaller0 [ 200.456719][ T5826] ÿÿÿÿÿÿ: renamed from vlan1 [ 201.435142][ T24] audit: type=1400 audit(1745804813.970:173): avc: denied { create } for pid=5866 comm="syz.0.1475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 201.677013][ T5885] cgroup: fork rejected by pids controller in /syz1 [ 202.155776][ T5917] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.198254][ T5917] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.245417][ T5917] device bridge_slave_0 entered promiscuous mode [ 202.252475][ T5917] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.269465][ T5917] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.276940][ T5917] device bridge_slave_1 entered promiscuous mode [ 202.704333][ T5917] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.711216][ T5917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.718355][ T5917] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.725213][ T5917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.750816][ T5936] device wg2 left promiscuous mode [ 202.824423][ T5938] device wg2 entered promiscuous mode [ 202.876960][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.891243][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.909978][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.942434][ T7] GPL: port 1(erspan0) entered disabled state [ 202.951039][ T7] device erspan0 left promiscuous mode [ 202.956855][ T7] GPL: port 1(erspan0) entered disabled state [ 202.968101][ T5952] device pim6reg1 entered promiscuous mode [ 202.974672][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.009682][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.030190][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.037103][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.051230][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.059765][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.067935][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.074816][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.108424][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.160150][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.233990][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.248855][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.279363][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 203.293506][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 203.325132][ T5967] device pim6reg1 entered promiscuous mode [ 203.374929][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 203.404868][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.440719][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.450852][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.464720][ T5971] device wg2 left promiscuous mode [ 203.536708][ T5917] device veth0_vlan entered promiscuous mode [ 203.589553][ T7] device bridge_slave_1 left promiscuous mode [ 203.595835][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.603085][ T7] device bridge_slave_0 left promiscuous mode [ 203.608994][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.800137][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 203.827671][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.836774][ T6003] syz.4.1517[6003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.836830][ T6003] syz.4.1517[6003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.907995][ T5917] device veth1_macvtap entered promiscuous mode [ 204.025440][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 204.193239][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 204.202352][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 204.211947][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 204.220628][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 204.230165][ T6009] device veth0_vlan left promiscuous mode [ 204.237093][ T6009] device veth0_vlan entered promiscuous mode [ 204.535764][ T6025] device syzkaller0 entered promiscuous mode [ 205.969753][ T6074] device syzkaller0 entered promiscuous mode [ 206.817088][ T6126] device sit0 entered promiscuous mode [ 207.505320][ T24] audit: type=1400 audit(1745804820.040:174): avc: denied { create } for pid=6150 comm="syz.2.1556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 208.134015][ T6178] device syzkaller0 entered promiscuous mode [ 209.311066][ T6212] device wg2 entered promiscuous mode [ 209.740449][ T6241] device syzkaller0 entered promiscuous mode [ 210.127244][ T6257] device syzkaller0 entered promiscuous mode [ 210.583149][ T6297] device sit0 left promiscuous mode [ 210.671740][ T6297] device sit0 entered promiscuous mode [ 210.965171][ T6314] device syzkaller0 entered promiscuous mode [ 212.186906][ T6346] device syzkaller0 entered promiscuous mode [ 212.787854][ T6386] syz.0.1620 (6386) used obsolete PPPIOCDETACH ioctl [ 214.523159][ T6464] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 216.353881][ T6486] device sit0 left promiscuous mode [ 216.702855][ T6508] device syzkaller0 entered promiscuous mode [ 216.715164][ T6512] device pim6reg1 entered promiscuous mode [ 223.529745][ T95] udevd[95]: worker [3247] terminated by signal 33 (Unknown signal 33) [ 223.573681][ T95] udevd[95]: worker [3247] failed while handling '/devices/virtual/block/loop1' [ 223.868361][ T6771] device pim6reg1 entered promiscuous mode [ 224.030986][ T6777] device wg2 entered promiscuous mode [ 224.074715][ T6785] device sit0 left promiscuous mode [ 224.191220][ T6792] device sit0 entered promiscuous mode [ 224.467785][ T6808] device sit0 left promiscuous mode [ 224.978412][ T24] audit: type=1400 audit(1745804837.510:175): avc: denied { create } for pid=6853 comm="syz.0.1747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 224.982224][ T6845] device pim6reg1 entered promiscuous mode [ 225.251930][ T6873] device sit0 left promiscuous mode [ 225.279189][ T6873] device sit0 entered promiscuous mode [ 225.491668][ T6884] syz.1.1757[6884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.491728][ T6884] syz.1.1757[6884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.864566][ T6884] device veth0_vlan left promiscuous mode [ 225.894822][ T6884] device veth0_vlan entered promiscuous mode [ 225.927221][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 225.941013][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 225.972908][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.147616][ T6910] device pim6reg1 entered promiscuous mode [ 226.474204][ T6927] device sit0 left promiscuous mode [ 226.913862][ T6957] device pim6reg1 entered promiscuous mode [ 226.929234][ T6950] geneve1: tun_chr_ioctl cmd 1074025672 [ 226.936111][ T6950] geneve1: ignored: set checksum enabled [ 227.789832][ T7031] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0500:0023 with DS=0x32 [ 228.301078][ T7043] device pim6reg1 entered promiscuous mode [ 228.642867][ T7058] device sit0 entered promiscuous mode [ 229.289201][ T7105] tap0: tun_chr_ioctl cmd 1074025675 [ 229.296681][ T7105] tap0: persist enabled [ 229.309895][ T7100] tap0: tun_chr_ioctl cmd 1074025675 [ 229.325732][ T7100] tap0: persist disabled [ 229.461732][ T7115] syz.3.1821[7115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.461821][ T7115] syz.3.1821[7115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.953999][ T7134] device sit0 entered promiscuous mode [ 230.259254][ T7155] ªªªªªª: renamed from vlan0 [ 230.373104][ T7169] device pim6reg1 entered promiscuous mode [ 230.902343][ T7186] device syzkaller0 entered promiscuous mode [ 235.063150][ T7414] device syzkaller0 entered promiscuous mode [ 236.300979][ T7438] device sit0 left promiscuous mode [ 237.025395][ T7470] device pim6reg1 entered promiscuous mode [ 237.375893][ T7473] device veth0_vlan left promiscuous mode [ 237.408927][ T7473] device veth0_vlan entered promiscuous mode [ 237.537539][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.546813][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.554638][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.632775][ T7520] device syzkaller0 entered promiscuous mode [ 238.891652][ T7539] device lo entered promiscuous mode [ 241.514375][ T7625] device syzkaller0 entered promiscuous mode [ 241.700913][ T7630] device syzkaller0 entered promiscuous mode [ 241.974085][ T7651] device veth0_vlan left promiscuous mode [ 242.059140][ T7651] device veth0_vlan entered promiscuous mode [ 242.299203][ T7670] device syzkaller0 entered promiscuous mode [ 243.147929][ T7730] syz.4.1991[7730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.148015][ T7730] syz.4.1991[7730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.994980][ T7742] device syzkaller0 entered promiscuous mode [ 244.497894][ T7770] device syzkaller0 entered promiscuous mode [ 245.346992][ T7797] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.419081][ T7797] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.436960][ T7797] device bridge_slave_0 entered promiscuous mode [ 245.478015][ T7797] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.486752][ T7797] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.504016][ T7797] device bridge_slave_1 entered promiscuous mode [ 245.775130][ T7797] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.782176][ T7797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.789232][ T7797] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.796046][ T7797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.997069][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.010000][ T2788] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.021695][ T2788] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.104886][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.116560][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.133740][ T2788] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.140658][ T2788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.163263][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.180289][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.198366][ T2788] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.205277][ T2788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.228215][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 246.236835][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.246084][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 246.255197][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.344465][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.356124][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.475481][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.488138][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.543250][ T7797] device veth0_vlan entered promiscuous mode [ 246.557518][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.572592][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.636817][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 246.652317][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.677432][ T385] device bridge_slave_1 left promiscuous mode [ 246.684637][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.721342][ T385] device bridge_slave_0 left promiscuous mode [ 246.729082][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.746683][ T385] device veth1_macvtap left promiscuous mode [ 246.759154][ T385] device veth0_vlan left promiscuous mode [ 246.955355][ T7797] device veth1_macvtap entered promiscuous mode [ 246.994080][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.012512][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 247.021807][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.069847][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 247.101910][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 247.524511][ T7857] device syzkaller0 entered promiscuous mode [ 249.802454][ T7959] syz.1.2054[7959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.802559][ T7959] syz.1.2054[7959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.502497][ T7985] device sit0 entered promiscuous mode [ 251.426201][ T8008] device syzkaller0 entered promiscuous mode [ 251.773980][ T8031] device pim6reg1 entered promiscuous mode [ 254.197636][ T8155] device syzkaller0 entered promiscuous mode [ 254.845729][ T8183] device veth0_vlan left promiscuous mode [ 254.868725][ T8183] device veth0_vlan entered promiscuous mode [ 256.266507][ T8234] device pim6reg1 entered promiscuous mode [ 256.763284][ T8265] device syzkaller0 entered promiscuous mode [ 262.591453][ T8479] device veth0_vlan left promiscuous mode [ 262.604990][ T8479] device veth0_vlan entered promiscuous mode [ 262.640325][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.649388][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 262.668290][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.404604][ T8502] device sit0 left promiscuous mode [ 264.451870][ T8554] device pim6reg1 entered promiscuous mode [ 264.978973][ T8579] device sit0 entered promiscuous mode [ 265.920940][ T8597] device sit0 left promiscuous mode [ 266.361190][ T8617] device veth0_vlan left promiscuous mode [ 266.390390][ T8617] device veth0_vlan entered promiscuous mode [ 266.426224][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.445809][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.490779][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.316866][ T8660] device macsec0 left promiscuous mode [ 268.950056][ T8719] device vlan0 entered promiscuous mode [ 269.176760][ T8734] syz.1.2269[8734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.176823][ T8734] syz.1.2269[8734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.380625][ T8746] device pim6reg1 entered promiscuous mode [ 269.526645][ T8750] device macsec0 entered promiscuous mode [ 269.714233][ T8763] device pim6reg1 entered promiscuous mode [ 270.354994][ T8787] device wg2 left promiscuous mode [ 270.585441][ T8787] device wg2 entered promiscuous mode [ 273.343476][ T8926] syz.4.2321[8926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.344581][ T8926] syz.4.2321[8926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.306816][ T8953] device wg2 entered promiscuous mode [ 274.516494][ T8964] syz.4.2332[8964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.516558][ T8964] syz.4.2332[8964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.720331][ T8978] device syzkaller0 entered promiscuous mode [ 278.977291][ T9085] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.984343][ T9085] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.859268][ T9236] device sit0 entered promiscuous mode [ 283.264201][ T9332] device veth0_vlan left promiscuous mode [ 283.307966][ T9332] device veth0_vlan entered promiscuous mode [ 283.332943][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.340901][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 283.349713][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.935910][ T9367] device pim6reg1 entered promiscuous mode [ 283.973842][ T9374] device pim6reg1 entered promiscuous mode [ 283.981239][ T9383] device veth0_vlan left promiscuous mode [ 283.995561][ T9383] device veth0_vlan entered promiscuous mode [ 284.016019][ T9383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.031712][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.071620][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.078728][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 284.160763][ T9386] device veth0_vlan left promiscuous mode [ 284.173592][ T9386] device veth0_vlan entered promiscuous mode [ 284.202710][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.224244][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.277531][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 290.035691][ T9646] device pim6reg1 entered promiscuous mode [ 290.480074][ T9684] device veth0_vlan left promiscuous mode [ 290.502692][ T9684] device veth0_vlan entered promiscuous mode [ 290.521227][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.529983][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.544033][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 291.351734][ T9735] device syzkaller0 entered promiscuous mode [ 291.867419][ T9755] device pim6reg1 entered promiscuous mode [ 292.180461][ T9790] syz.3.2553[9790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.180549][ T9790] syz.3.2553[9790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.713914][ T9846] device pim6reg1 entered promiscuous mode [ 294.968707][ T9920] device pim6reg1 entered promiscuous mode [ 295.150244][ T9928] device syzkaller0 entered promiscuous mode [ 296.624856][ T9995] device syzkaller0 entered promiscuous mode [ 296.706320][ T9997] device pim6reg1 entered promiscuous mode [ 297.872564][T10023] device syzkaller0 entered promiscuous mode [ 297.985444][T10055] device syzkaller0 entered promiscuous mode [ 298.365075][T10067] device syzkaller0 entered promiscuous mode [ 298.658091][T10101] device wg2 left promiscuous mode [ 298.751625][T10103] device wg2 entered promiscuous mode [ 299.090016][T10113] syz.2.2643[10113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.090078][T10113] syz.2.2643[10113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.259980][T10214] device pim6reg1 entered promiscuous mode [ 301.520929][T10221] device syzkaller0 entered promiscuous mode [ 301.642621][ T1573] syzkaller0: tun_net_xmit 48 [ 301.731101][T10224] syzkaller0: create flow: hash 3851220636 index 3 [ 301.731537][T10232] tun0: tun_chr_ioctl cmd 1074025676 [ 301.754070][T10232] tun0: owner set to 0 [ 301.759636][T10224] syzkaller0: delete flow: hash 3851220636 index 3 [ 302.355221][T10260] device syzkaller0 entered promiscuous mode [ 302.400683][ T24] audit: type=1400 audit(1745804914.920:176): avc: denied { write } for pid=10269 comm="syz.2.2687" name="net" dev="proc" ino=51166 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 302.424784][ T24] audit: type=1400 audit(1745804914.920:177): avc: denied { add_name } for pid=10269 comm="syz.2.2687" name="blkio.bfq.io_queued" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 302.449780][ T24] audit: type=1400 audit(1745804914.920:178): avc: denied { create } for pid=10269 comm="syz.2.2687" name="blkio.bfq.io_queued" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 302.472810][ T24] audit: type=1400 audit(1745804914.920:179): avc: denied { associate } for pid=10269 comm="syz.2.2687" name="blkio.bfq.io_queued" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 303.603611][T10317] device pim6reg1 entered promiscuous mode [ 303.655067][T10313] device pim6reg1 entered promiscuous mode [ 305.357535][T10478] device veth0_to_team entered promiscuous mode [ 305.654205][T10505] device wg2 left promiscuous mode [ 305.669324][T10505] device wg2 entered promiscuous mode [ 305.773515][T10511] syz.2.2755 uses obsolete (PF_INET,SOCK_PACKET) [ 305.924625][T10523] device sit0 left promiscuous mode [ 306.034856][T10529] device sit0 entered promiscuous mode [ 306.794992][T10570] device sit0 left promiscuous mode [ 306.910459][T10570] device sit0 entered promiscuous mode [ 307.735123][T10597] device syzkaller0 entered promiscuous mode [ 308.275945][T10635] device wg2 entered promiscuous mode [ 308.848344][T10675] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.869447][T10675] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.884533][T10675] device bridge_slave_0 entered promiscuous mode [ 308.906266][T10675] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.929658][T10675] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.946751][T10675] device bridge_slave_1 entered promiscuous mode [ 309.052844][T10690] device pim6reg1 entered promiscuous mode [ 309.324688][T10675] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.331640][T10675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.338692][T10675] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.345479][T10675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.381717][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.391413][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.409209][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.431895][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.442200][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.449047][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.467192][T10703] syz.1.2803[10703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.476781][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.496668][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.503577][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.511648][T10703] device pim6reg1 entered promiscuous mode [ 309.524530][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.547321][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 309.633547][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 309.666576][T10675] device veth0_vlan entered promiscuous mode [ 309.684785][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 309.709409][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.725685][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.762234][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 309.773342][T10717] device veth0_to_team entered promiscuous mode [ 309.847599][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 309.872290][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 309.929603][T10675] device veth1_macvtap entered promiscuous mode [ 309.970719][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 310.002365][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 310.015082][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 310.023458][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 310.031778][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 310.089037][T10730] device pim6reg1 entered promiscuous mode [ 310.259931][ T7] device veth0 left promiscuous mode [ 310.265847][ T7] bridge0: port 3(veth0) entered disabled state [ 310.301891][ T7] device bridge_slave_1 left promiscuous mode [ 310.308109][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.317768][ T7] device bridge_slave_0 left promiscuous mode [ 310.324437][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.347565][ T7] device veth1_macvtap left promiscuous mode [ 310.486167][T10738] device pim6reg1 entered promiscuous mode [ 310.521121][T10744] device sit0 left promiscuous mode [ 310.535651][T10746] device sit0 entered promiscuous mode [ 310.702564][T10750] device sit0 entered promiscuous mode [ 311.514480][T10776] device syzkaller0 entered promiscuous mode [ 312.227078][T10814] device bridge_slave_1 left promiscuous mode [ 312.236508][T10814] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.253524][T10814] device bridge_slave_0 left promiscuous mode [ 312.339713][T10814] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.740754][T10962] device pim6reg1 entered promiscuous mode [ 316.354813][T10978] Â: renamed from pim6reg1 [ 316.399474][T10987] device syzkaller0 entered promiscuous mode [ 317.801424][T11057] device syzkaller0 entered promiscuous mode [ 318.123297][T11077] device syzkaller0 entered promiscuous mode [ 318.584757][T11109] syz.2.2912[11109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.587023][T11109] syz.2.2912[11109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.697170][T11113] Â: renamed from pim6reg1 [ 318.764142][T11117] syz.1.2916[11117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.764199][T11117] syz.1.2916[11117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.947309][T11118] device pim6reg1 entered promiscuous mode [ 319.511394][T11151] device veth0_vlan left promiscuous mode [ 319.527645][T11151] device veth0_vlan entered promiscuous mode [ 319.570347][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 319.598181][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 319.628975][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 319.662089][T11159] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.669121][T11159] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.681220][T11168] device bridge_slave_1 left promiscuous mode [ 319.692417][T11168] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.699997][T11168] device bridge_slave_0 left promiscuous mode [ 319.706317][T11168] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.020814][T11180] device wg2 left promiscuous mode [ 320.041803][T11180] device wg2 entered promiscuous mode [ 320.337879][T11218] tun0: tun_chr_ioctl cmd 1074025692 [ 320.473670][T11230] device syzkaller0 entered promiscuous mode [ 320.534387][T11238] device syzkaller0 entered promiscuous mode [ 320.833989][T11257] device sit0 left promiscuous mode [ 321.546307][T11287] @ÿ: renamed from bond_slave_0 [ 321.811887][T11307] device pim6reg1 entered promiscuous mode [ 322.242170][T11329] device pim6reg1 entered promiscuous mode [ 322.319472][T11329] device sit0 entered promiscuous mode [ 323.032168][T11350] device syzkaller0 entered promiscuous mode [ 323.567419][T11374] device pim6reg1 entered promiscuous mode [ 324.285900][T11394] device pim6reg1 entered promiscuous mode [ 325.418756][T11430] device wg2 left promiscuous mode [ 327.691619][T11474] device veth0_vlan left promiscuous mode [ 327.764461][T11474] device veth0_vlan entered promiscuous mode [ 327.830155][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 327.842705][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 327.902941][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.922626][ T24] audit: type=1400 audit(1745804942.450:180): avc: denied { ioctl } for pid=11538 comm="syz.1.3029" path="" dev="cgroup2" ino=197 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 329.982936][T11546] device pim6reg1 entered promiscuous mode [ 333.075958][T11726] device veth1_macvtap left promiscuous mode [ 333.373919][T11740] device sit0 entered promiscuous mode [ 335.408354][T11797] device macsec0 left promiscuous mode [ 335.479162][ T24] audit: type=1400 audit(1745804948.010:181): avc: denied { create } for pid=11808 comm="syz.2.3104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 335.555132][T11797] 5: renamed from syzkaller0 [ 335.639352][T11807] device macsec0 entered promiscuous mode [ 336.830381][T11831] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.881443][T11831] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.895360][T11831] device bridge_slave_0 entered promiscuous mode [ 336.936498][T11831] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.953714][T11831] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.988708][T11831] device bridge_slave_1 entered promiscuous mode [ 337.079582][T11840] device syzkaller0 entered promiscuous mode [ 337.632044][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 337.639795][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.685538][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 337.699521][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.707877][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.714760][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.722252][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 337.730814][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.739231][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.746252][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.755944][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 337.763742][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.771747][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.779508][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.787553][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.847187][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 337.921684][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.929756][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.937261][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 337.945543][T11831] device veth0_vlan entered promiscuous mode [ 338.000401][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 338.018403][T11831] device veth1_macvtap entered promiscuous mode [ 338.076994][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 338.085935][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 338.115514][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 338.123896][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 338.157089][T11893] device veth0_vlan left promiscuous mode [ 338.175064][T11893] device veth0_vlan entered promiscuous mode [ 338.189093][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.198395][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.206124][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.770220][T11988] device pim6reg1 entered promiscuous mode [ 340.789675][T11986] tun0: tun_chr_ioctl cmd 1074025676 [ 340.795140][T11986] tun0: owner set to 0 [ 341.481029][T12021] device syzkaller0 entered promiscuous mode [ 342.006824][T12048] syz.4.3168[12048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.006885][T12048] syz.4.3168[12048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.175582][T12055] device syzkaller0 entered promiscuous mode [ 344.854477][T12202] device pim6reg1 entered promiscuous mode [ 346.671730][T12250] device pim6reg1 entered promiscuous mode [ 348.280350][T12274] device pim6reg1 entered promiscuous mode [ 348.641948][T12278] device syzkaller0 entered promiscuous mode [ 349.253888][T12308] syz.2.3244[12308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.253952][T12308] syz.2.3244[12308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.477063][T12344] device vxcan1 entered promiscuous mode [ 354.400239][T12488] device syzkaller0 entered promiscuous mode [ 356.353978][T12570] device sit0 left promiscuous mode [ 356.475837][T12573] device veth1_macvtap left promiscuous mode [ 356.497349][T12556] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.504934][T12556] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.512666][T12556] device bridge_slave_0 entered promiscuous mode [ 356.537008][T12556] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.552381][T12556] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.559744][T12556] device bridge_slave_1 entered promiscuous mode [ 357.412057][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 357.419811][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 357.427933][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.436506][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.448458][ T2788] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.455351][ T2788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.463187][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.471795][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.479979][ T2788] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.486863][ T2788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.546752][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.573584][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 357.665357][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.730611][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 357.738887][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.747591][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 357.757006][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 357.774409][T12556] device veth0_vlan entered promiscuous mode [ 357.780612][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 357.789451][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 357.803467][T12556] device veth1_macvtap entered promiscuous mode [ 357.809945][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 357.822704][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 357.830597][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 357.840491][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 357.848656][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 357.859435][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 357.867885][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 357.878460][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 357.887059][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 358.771035][T12680] device sit0 entered promiscuous mode [ 358.968937][T12698] syz.0.3345[12698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.969027][T12698] syz.0.3345[12698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 359.396080][T12752] device pim6reg1 entered promiscuous mode [ 360.172420][T12800] device pim6reg1 entered promiscuous mode [ 362.924857][T12913] device sit0 left promiscuous mode [ 363.172877][T12920] syz.4.3409[12920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.172932][T12920] syz.4.3409[12920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.927999][T12950] device syzkaller0 entered promiscuous mode [ 365.161597][T12997] device syzkaller0 entered promiscuous mode [ 365.590284][T13030] device syzkaller0 entered promiscuous mode [ 365.870774][T13037] device syzkaller0 entered promiscuous mode [ 366.266660][T13052] syz.4.3444[13052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.268941][T13052] syz.4.3444[13052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.201743][T13094] syz.3.3455[13094] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.470007][T13113] device syzkaller0 entered promiscuous mode [ 367.810235][T13139] device wg2 entered promiscuous mode [ 368.629579][T13161] device pim6reg1 entered promiscuous mode [ 369.327701][T13190] device syzkaller0 entered promiscuous mode [ 369.488719][T13214] syz.2.3486[13214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.674798][T13233] device pim6reg1 entered promiscuous mode [ 370.473292][T13269] device wg2 left promiscuous mode [ 372.197483][T13364] device syzkaller0 entered promiscuous mode [ 373.206854][T13425] syz.1.3545[13425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.206941][T13425] syz.1.3545[13425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.356422][T13447] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.376277][T13447] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.464214][T13454] device bridge_slave_1 left promiscuous mode [ 376.507277][T13454] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.544820][T13454] device bridge_slave_0 left promiscuous mode [ 376.574705][T13454] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.079196][T13472] device syzkaller0 entered promiscuous mode [ 378.829812][T13572] device pim6reg1 entered promiscuous mode [ 378.947456][T13572] device veth0_vlan left promiscuous mode [ 378.998492][T13572] device veth0_vlan entered promiscuous mode [ 379.108680][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.142977][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.214070][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 379.576540][T13603] device veth0_vlan left promiscuous mode [ 379.623052][T13603] device veth0_vlan entered promiscuous mode [ 379.655287][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.677713][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.736344][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 380.069314][T13616] syz.2.3597[13616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.150640][T13681] device sit0 entered promiscuous mode [ 381.402630][T13692] device macsec0 entered promiscuous mode [ 381.432350][T13684] device veth0_vlan left promiscuous mode [ 381.486011][T13684] device veth0_vlan entered promiscuous mode [ 381.534312][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 381.560282][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 381.572877][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 381.956946][T13738] device pim6reg1 entered promiscuous mode [ 383.143337][T13796] syz.3.3646[13796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.143423][T13796] syz.3.3646[13796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.911554][T13828] device syzkaller0 entered promiscuous mode [ 384.880183][T13888] device pim6reg1 entered promiscuous mode [ 384.896397][T13891] device syzkaller0 entered promiscuous mode [ 386.284242][T13921] device sit0 entered promiscuous mode [ 388.563459][T14018] device syzkaller0 entered promiscuous mode [ 389.145320][T14027] device syzkaller0 entered promiscuous mode [ 390.756132][T14054] device syzkaller0 entered promiscuous mode [ 391.215689][T14073] device veth0_vlan left promiscuous mode [ 391.271178][T14073] device veth0_vlan entered promiscuous mode [ 391.808765][ T24] audit: type=1400 audit(1745805004.340:182): avc: denied { create } for pid=14130 comm="syz.0.3737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 392.307534][T14148] Â: renamed from pim6reg1 [ 392.414159][T14148] device sit0 left promiscuous mode [ 392.547769][T14157] device pim6reg1 entered promiscuous mode [ 392.648241][T14174] syz.3.3749[14174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.648302][T14174] syz.3.3749[14174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.650776][T14175] syz.3.3749[14175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.724525][T14175] syz.3.3749[14175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.992634][T14233] device syzkaller0 entered promiscuous mode [ 394.987578][T14269] device syzkaller0 entered promiscuous mode [ 395.718025][T14309] device pim6reg1 entered promiscuous mode [ 395.994178][T14311] device syzkaller0 entered promiscuous mode [ 396.904376][T14348] device pim6reg1 entered promiscuous mode [ 397.045969][T14375] syz.3.3808[14375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.046030][T14375] syz.3.3808[14375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.085432][T14387] device pim6reg1 entered promiscuous mode [ 399.307206][T14472] GPL: port 1(dummy0) entered blocking state [ 399.325576][T14472] GPL: port 1(dummy0) entered disabled state [ 399.342260][T14472] device dummy0 entered promiscuous mode [ 399.393795][T14485] device dummy0 left promiscuous mode [ 399.421661][T14485] GPL: port 1(dummy0) entered disabled state [ 400.175734][T14531] tun0: tun_chr_ioctl cmd 1074025676 [ 400.180882][T14531] tun0: owner set to 0 [ 400.667022][T14535] device syzkaller0 entered promiscuous mode [ 401.053392][T14535] device wg2 entered promiscuous mode [ 401.125292][T14544] device sit0 entered promiscuous mode [ 402.249101][T14604] device pim6reg1 entered promiscuous mode [ 402.487504][T14625] device syzkaller0 entered promiscuous mode [ 402.804122][T14651] device veth0_vlan left promiscuous mode [ 402.809690][T14651] device veth0_vlan entered promiscuous mode [ 402.818622][T14651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 402.830896][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 402.841536][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 402.848615][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 404.956986][T14757] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.018895][T14757] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.041660][T14757] device bridge_slave_0 entered promiscuous mode [ 405.068313][T14757] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.080110][T14757] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.097853][T14757] device bridge_slave_1 entered promiscuous mode [ 405.581520][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 405.595391][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 405.670452][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 405.689191][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 405.697611][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.704508][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.712501][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 405.720777][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 405.729299][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.736176][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.773662][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 405.789235][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 405.803732][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 405.818325][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 405.889764][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 405.958234][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 405.977513][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 406.078718][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 406.105732][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 406.182943][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 406.234761][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 406.300995][T14757] device veth0_vlan entered promiscuous mode [ 406.357425][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 406.382356][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 406.462018][T14757] device veth1_macvtap entered promiscuous mode [ 406.514222][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 406.527782][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 406.637630][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 406.666453][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 407.616560][ T2788] device veth1_macvtap left promiscuous mode [ 410.081442][T14938] device pim6reg1 entered promiscuous mode [ 411.417378][T14998] device sit0 entered promiscuous mode [ 412.951675][T15057] device syzkaller0 entered promiscuous mode [ 413.231936][T15090] device sit0 left promiscuous mode [ 413.320814][T15091] device sit0 entered promiscuous mode [ 413.935926][T15116] device wg2 entered promiscuous mode [ 414.234557][T15128] device syzkaller0 entered promiscuous mode [ 416.678872][T15263] device wg2 left promiscuous mode [ 417.357963][T15290] syz.0.4052[15290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.358038][T15290] syz.0.4052[15290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.468233][T15301] device syzkaller0 entered promiscuous mode [ 417.572613][T15322] device wg2 left promiscuous mode [ 418.266099][T15371] device pim6reg1 entered promiscuous mode [ 418.965842][T15415] ^S­µ: renamed from pim6reg1 [ 420.985947][T15510] device sit0 left promiscuous mode [ 422.629481][T15585] device veth0_vlan left promiscuous mode [ 422.667124][T15585] device veth0_vlan entered promiscuous mode [ 422.700204][T15585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 422.734109][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 422.748599][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 422.755823][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 422.796582][T15596] device veth1_macvtap left promiscuous mode [ 422.934957][T15612] device sit0 left promiscuous mode [ 422.995904][T15612] device sit0 entered promiscuous mode [ 424.733486][T15728] device syzkaller0 entered promiscuous mode [ 425.058538][T15744] device pim6reg1 entered promiscuous mode [ 425.185365][T15746] device sit0 left promiscuous mode [ 425.223976][T15746] device sit0 entered promiscuous mode [ 425.528713][T15754] device veth1_macvtap left promiscuous mode [ 426.435027][T15792] device syzkaller0 entered promiscuous mode [ 427.173183][T15842] ÿÿÿÿÿÿaaaaaaaaa: renamed from vlan1 [ 428.067595][T15883] syz.0.4211[15883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.067663][T15883] syz.0.4211[15883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.387709][T15932] device syzkaller0 entered promiscuous mode [ 429.797638][T15952] device sit0 left promiscuous mode [ 430.125207][T15961] device sit0 entered promiscuous mode [ 430.576063][T15988] device pim6reg1 entered promiscuous mode [ 431.111653][T16014] device syzkaller0 entered promiscuous mode [ 432.783316][T16051] device syzkaller0 entered promiscuous mode [ 433.043191][T16054] syz.3.4255[16054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.045054][T16054] syz.3.4255[16054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.880912][T16071] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.901942][T16071] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.117801][T16071] device bridge_slave_1 left promiscuous mode [ 434.125180][T16071] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.154395][T16071] device bridge_slave_0 left promiscuous mode [ 434.182306][T16071] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.748512][T16172] device syzkaller0 entered promiscuous mode [ 438.556494][T16195] device pim6reg1 entered promiscuous mode [ 439.726640][T16227] device veth0_vlan left promiscuous mode [ 439.840173][T16227] device veth0_vlan entered promiscuous mode [ 439.935823][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 439.944072][T16235] syz.1.4305[16235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.944171][T16235] syz.1.4305[16235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.947580][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 440.098640][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 440.121771][T16232] device sit0 entered promiscuous mode [ 440.920166][T16274] device veth0_vlan left promiscuous mode [ 440.926178][T16274] device veth0_vlan entered promiscuous mode [ 441.352048][T16303] device syzkaller0 entered promiscuous mode [ 441.630977][T16312] device veth0_vlan left promiscuous mode [ 441.640995][T16312] device veth0_vlan entered promiscuous mode [ 442.105941][T16331] device syzkaller0 entered promiscuous mode [ 442.113048][T16328] device pim6reg1 entered promiscuous mode [ 442.325091][T16344] syz.1.4333[16344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.325163][T16344] syz.1.4333[16344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.719362][T16358] device veth0_vlan left promiscuous mode [ 442.773293][T16358] device veth0_vlan entered promiscuous mode [ 443.695231][T16423] device veth1_macvtap left promiscuous mode [ 443.701058][T16423] device macsec0 entered promiscuous mode [ 444.440692][T16451] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.449811][T16451] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.507410][T16575] device syzkaller0 entered promiscuous mode [ 448.370867][T16599] device sit0 entered promiscuous mode [ 450.190674][T16710] device sit0 left promiscuous mode [ 450.285905][T16711] device sit0 entered promiscuous mode [ 451.716607][T16765] device syzkaller0 entered promiscuous mode [ 451.965337][T16779] device syzkaller0 entered promiscuous mode [ 452.082648][T16795] device macsec0 entered promiscuous mode [ 454.256884][T16894] device macsec0 entered promiscuous mode [ 454.825031][T16914] device veth0_vlan left promiscuous mode [ 454.881263][T16914] device veth0_vlan entered promiscuous mode [ 454.948222][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 454.964417][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 454.981825][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 455.430012][T16952] device pim6reg1 entered promiscuous mode [ 455.529970][T16957] device syzkaller0 entered promiscuous mode [ 455.752391][T16971] device sit0 left promiscuous mode [ 455.982363][T16972] device sit0 entered promiscuous mode [ 456.231505][ T24] audit: type=1400 audit(1745805068.760:183): avc: denied { create } for pid=16988 comm="syz.2.4509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 460.529302][T17179] device wg2 entered promiscuous mode [ 460.605438][ T24] audit: type=1400 audit(1745805073.140:184): avc: denied { create } for pid=17192 comm="syz.0.4562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 461.473978][T17224] device sit0 left promiscuous mode [ 461.892858][T17254] device wg2 left promiscuous mode [ 461.899297][T17260] device wg2 entered promiscuous mode [ 463.393458][T17289] device sit0 left promiscuous mode [ 463.428496][T17289] device sit0 entered promiscuous mode [ 465.081952][T17321] device sit0 left promiscuous mode [ 465.472491][T17321] device sit0 entered promiscuous mode [ 465.636270][T17332] device veth0_vlan left promiscuous mode [ 465.653644][T17332] device veth0_vlan entered promiscuous mode [ 465.697397][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 465.715517][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 465.728264][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿaaaaaaaaa: link becomes ready [ 468.941311][T17408] device sit0 left promiscuous mode [ 469.034049][T17415] device sit0 entered promiscuous mode [ 469.174248][T17423] device veth0_vlan left promiscuous mode [ 469.186718][T17423] device veth0_vlan entered promiscuous mode [ 469.238109][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 469.251523][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 469.276234][ T385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 469.353620][T17444] device pim6reg1 entered promiscuous mode [ 470.987500][T17508] device sit0 left promiscuous mode [ 471.090631][T17508] device sit0 entered promiscuous mode [ 471.813466][T17538] Â: renamed from pim6reg1 [ 472.209507][T17557] device syzkaller0 entered promiscuous mode [ 472.519365][T17561] device syzkaller0 entered promiscuous mode [ 472.602086][ T1576] syzkaller0: tun_net_xmit 48 [ 472.608361][T17561] syzkaller0: create flow: hash 3851220636 index 3 [ 472.645708][T17561] syzkaller0: delete flow: hash 3851220636 index 3 [ 473.018783][T17581] device veth0_vlan left promiscuous mode [ 473.031996][T17581] device veth0_vlan entered promiscuous mode [ 473.038926][T17581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 473.061521][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 473.069257][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 473.093077][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 476.840056][T17765] device pim6reg1 entered promiscuous mode [ 477.495091][T17824] device pim6reg1 entered promiscuous mode [ 479.330553][T17934] syz.4.4753[17934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 479.330616][T17934] syz.4.4753[17934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 479.830245][T17955] device pim6reg1 entered promiscuous mode [ 479.941999][T17966] device sit0 left promiscuous mode [ 480.029288][T17975] syz.1.4766[17975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.029351][T17975] syz.1.4766[17975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.067788][T17976] device veth0_vlan left promiscuous mode [ 480.133518][T17976] device veth0_vlan entered promiscuous mode [ 480.236518][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 480.252030][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 480.301988][ T2788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 480.311594][ T24] audit: type=1400 audit(1745805092.850:185): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 480.406642][ T24] audit: type=1400 audit(1745805092.850:186): avc: denied { unlink } for pid=77 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 480.480024][T17994] device syzkaller0 entered promiscuous mode [ 480.488243][ T24] audit: type=1400 audit(1745805092.850:187): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 480.873098][T18022] device sit0 left promiscuous mode [ 481.678859][T18033] device syzkaller0 entered promiscuous mode [ 481.851610][T18050] syz.0.4788[18050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.851711][T18050] syz.0.4788[18050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.863427][T18046] device pim6reg1 entered promiscuous mode [ 481.908937][T18049] syz.0.4788[18049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.909028][T18049] syz.0.4788[18049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.304990][T18073] syz.1.4792[18073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.316599][T18074] syz.1.4792[18074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.006532][T18108] device syzkaller0 entered promiscuous mode [ 484.603434][T18174] device sit0 entered promiscuous mode [ 485.429979][T18222] bpf_get_probe_write_proto: 1 callbacks suppressed [ 485.429990][T18222] syz.2.4835[18222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.447216][T18221] syz.2.4835[18221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.913269][T18249] syz.3.4844[18249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.940136][T18249] syz.3.4844[18249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 486.594390][T18296] device pim6reg1 entered promiscuous mode [ 487.033065][T18321] device syzkaller0 entered promiscuous mode [ 488.002774][T18360] device syzkaller0 entered promiscuous mode [ 489.262392][T18397] device syzkaller0 entered promiscuous mode [ 489.571046][T18403] device wg2 left promiscuous mode [ 489.649057][T18409] device wg2 entered promiscuous mode [ 493.237250][T18482] device syzkaller0 entered promiscuous mode [ 493.324347][T18482] syzkaller0: tun_net_xmit 1280 [ 493.416978][T18482] syzkaller0: create flow: hash 1587412520 index 1 [ 493.529724][T18477] syzkaller0: delete flow: hash 1587412520 index 1 [ 493.806793][T18517] device wg2 left promiscuous mode [ 493.845079][T18511] device sit0 left promiscuous mode [ 495.619329][T18595] device wg2 left promiscuous mode [ 495.750928][T18601] device wg2 entered promiscuous mode [ 495.777933][T18603] tun0: tun_chr_ioctl cmd 1074025676 [ 495.783205][T18603] tun0: owner set to 0 [ 496.024900][T18609] device sit0 left promiscuous mode [ 497.758789][T18721] device pim6reg1 entered promiscuous mode [ 499.657587][T18826] syz.1.5008[18826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 500.433173][T18894] sock: sock_set_timeout: `syz.3.5030' (pid 18894) tries to set negative timeout [ 501.175302][T18933] device syzkaller0 entered promiscuous mode [ 504.567799][T19059] device veth0_vlan left promiscuous mode [ 504.607808][T19059] device veth0_vlan entered promiscuous mode [ 504.697029][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 504.715501][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 504.801571][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 505.227464][T19085] device syzkaller0 entered promiscuous mode [ 505.848982][T19106] device macsec0 left promiscuous mode [ 506.296890][T19123] device wg2 left promiscuous mode [ 506.456627][T19122] device wg2 entered promiscuous mode