last executing test programs: 2m15.426077101s ago: executing program 3 (id=1119): bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r0, 0x0, 0x4d, 0xcf, &(0x7f0000000280)="e07ade0df715c292433c87aa6dc098a6cf76599a4345b7107d7dc89f6eb2e390f0b6e23f787a79a92b79b4409ce0a9d22c55423222d0f49a42361ca7584a0179cff477c043d38505ebf255c0a9", &(0x7f00000004c0)=""/207, 0x8, 0x0, 0xd4, 0xa2, &(0x7f00000005c0)="f191a431f5051c3c2e4cd296e9a945ade94ff3ac4527bd83dd4c10c6e4b30b3a9d34dcf3b8c74335102be275637ad1aebae749b8d6c53a52a33562a49fe8368bef99930f2d599e313770d87c1545920753d77d19f1fdcf1e7af7d3a948590409d3129ce694032aa19335c65e9cd5a3520db878dba7377e135af3d41d7eebfbe300a027c2f70927f80a2a7c0e82af74ca3398a970b092901a3e4165d6385c5e94db175573a31b2be3f97bbf0d27557d1f11e99191332e241c5cafc27f0f7c6d891d09b883fd07ad3cde86b85ccaab68900a38517a", &(0x7f0000000380)="419a5452ec2605ae0dc497bfc50b42f6151c2c5c243eb359debe698b2e7273973aa954fc00aedebeb70b0d95036c9ad4ec36f4ffc14d20d6acf35f13813463b25c3ed8d71e70fc421e1532c3e6c53c0e8d74ddab35176a455892a73e97299ca67bbfb48f7a1a8d70c38ed870dcc657988b2bffc8cda7a40c292184a9d8dd113d32ebc5178ec6578dd7706cc9e7f19065a2b59c693f41f5463b96d70e9e6e196f6ea9", 0x4, 0x0, 0x9}, 0x50) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000001180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000001100)=ANY=[@ANYRESHEX, @ANYRESOCT], 0x27) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x599, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r3, 0x0, 0x1ba8847c99}, 0x38) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) (async, rerun: 64) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r4, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x22a, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x3a}, 0x90) (async, rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) 2m15.345277219s ago: executing program 3 (id=1121): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003500)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd4d}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='netlink_extack\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x62, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0xbe9bac6d2d0f4e0b) 2m15.164449927s ago: executing program 3 (id=1123): bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1700}, 0x48) 2m15.110102353s ago: executing program 3 (id=1125): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x80, 0x80, 0x3, 0x5, 0x9, 0x0, 0xfffffffffffffffb, 0x4000, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xb6, 0x4, @perf_bp={&(0x7f0000000040), 0xe}, 0x11271, 0x7, 0x800, 0x5, 0x215, 0x8, 0xf00, 0x0, 0x1}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x12, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="1800000000000000000000000020e5d244b3000000630138000000000095000062d3b3833a"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x20780, 0x0, '\x00', 0x0, 0x14}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000005c0)='kfree_skb\x00', r4}, 0x18) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r6}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000980), 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dc}, 0x50) 2m15.006916573s ago: executing program 1 (id=1126): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000867ef75ecb00"/25, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{}, {}, {}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0, 0x2}, 0x20) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000640)='xen_cpu_set_ldt\x00', r2, 0x0, 0xfffffffffffffffc}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000000bf0000000000000000008500000020000000850000000500000095"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000002380)=""/192}, 0x94) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0x8, 0x9}, 0x20, 0xe, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x80040, 0x0, 0x3}, 0x0, 0xf, r1, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8940, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYRES8, @ANYRESDEC=r5], &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2m14.615372281s ago: executing program 1 (id=1128): bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x7, 0x0}, 0x8) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r0}, 0x4) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x6, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x1, 0xd, 0x5, 0x5, 0x40, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x1, 0x2, 0x9, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x70, &(0x7f0000000100)=""/112, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x4, 0x8ae, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000200)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000240)=[{0x5, 0x4, 0x1, 0x9}, {0x1, 0x5, 0x3, 0x1}, {0x4, 0x3, 0x7, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x5, 0x5, 0x5, 0x6}, {0x4, 0x3, 0x2, 0x5}], 0x10, 0xb30}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup, 0x1d, 0x1, 0x680, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0]}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=0xffffffffffffffff, 0x1d, 0x1, 0x680, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000004c0)={@fallback=r1, r2, 0x30, 0x8, r1, @void, @value=r1, @void, @void, r4}, 0x20) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x5b3, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r2, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0], 0x0, 0xc1, &(0x7f0000000780)=[{}, {}], 0x10, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x73, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b40)={&(0x7f00000009c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xaa, 0xaa, 0x9, [@datasec={0x8, 0x5, 0x0, 0xf, 0x1, [{0x1, 0x3, 0x2}, {0x2, 0x200, 0x5}, {0x4, 0x0, 0x6}, {0x3, 0x80000001, 0x41}, {0x3, 0xfffffc01, 0xa28f}], "af"}, @func={0x3, 0x0, 0x0, 0xc, 0x1}, @type_tag={0x5, 0x0, 0x0, 0x12, 0x4}, @datasec={0x3, 0x2, 0x0, 0xf, 0x1, [{0x4, 0x1, 0x5}, {0x5, 0x7ff, 0x10}], "12"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0xfffff341, 0xfffff388}}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x0, 0x30, 0x61, 0x2e, 0x5f, 0x0, 0x0]}}, &(0x7f0000000ac0)=""/113, 0xcd, 0x71, 0x1, 0x66d14888}, 0x28) r9 = openat$cgroup_ro(r3, &(0x7f0000000c00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b40)=@generic={&(0x7f0000000c40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x18}, 0x18) (async) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b40)=@generic={&(0x7f0000000c40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001c00)=@bpf_tracing={0x1a, 0x10, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000600)='syzkaller\x00', 0x3ff, 0x80, &(0x7f0000000640)=""/128, 0x41100, 0x45, '\x00', r6, 0x19, r8, 0x8, &(0x7f0000000b80)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000bc0)={0x2, 0x7, 0x4, 0x1}, 0x10, 0xa3cd, r9, 0x4, &(0x7f0000001b80)=[r10], &(0x7f0000001bc0)=[{0x5, 0x3, 0xc, 0x3}, {0x0, 0x2, 0x3, 0x8}, {0x1, 0x5, 0xa, 0xa}, {0x5, 0x5, 0x2, 0x7}], 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001cc0)=@base={0x470b4749ee8b7326, 0x8, 0x5, 0x0, 0x28, r9, 0x6, '\x00', r6, 0xffffffffffffffff, 0x2, 0x0, 0x2}, 0x50) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001cc0)=@base={0x470b4749ee8b7326, 0x8, 0x5, 0x0, 0x28, r9, 0x6, '\x00', r6, 0xffffffffffffffff, 0x2, 0x0, 0x2}, 0x50) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001e40)={&(0x7f0000001d40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0x94, 0x5, [@func={0x10, 0x0, 0x0, 0xc, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0xffffffff}}, @volatile={0xd, 0x0, 0x0, 0x9, 0x3}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xf, 0x5}, {0x6, 0x3}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x0, 0x5}, {0x6, 0x5}, {0x5, 0x5}, {0x4, 0x5}, {0xd, 0x2}, {0xb, 0x5}]}, @restrict={0xa, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x5f, 0x0, 0x2e]}}, &(0x7f0000001e00)=""/44, 0xb1, 0x2c, 0x0, 0x3450}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001e80)={0x1b, 0x0, 0x0, 0x0, 0x0, r11, 0x7, '\x00', r6, r12, 0x4, 0x4}, 0x50) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={@cgroup=r9, r9, 0xf, 0x0, r9, @void, @value=r9, @void, @void, r4}, 0x20) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001f00)={@cgroup=r9, r9, 0xf, 0x0, r9, @void, @value=r9, @void, @void, r4}, 0x20) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001f40)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xb, '\x00', r6, r8, 0x4, 0x2, 0x5}, 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001fc0)=r7, 0x4) (async) r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001fc0)=r7, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002000)={0x2, 0x4, 0x8, 0x1, 0x80, r13, 0x2, '\x00', r6, r14, 0x2, 0x3}, 0x50) recvmsg$unix(r9, &(0x7f0000002600)={&(0x7f0000002080), 0x6e, &(0x7f0000002480)=[{&(0x7f0000002100)=""/98, 0x62}, {&(0x7f0000002180)=""/183, 0xb7}, {&(0x7f0000002240)=""/200, 0xc8}, {&(0x7f0000002340)=""/51, 0x33}, {&(0x7f0000002380)=""/183, 0xb7}, {&(0x7f0000002440)=""/46, 0x2e}], 0x6, &(0x7f0000002500)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0}, 0x40002000) syz_clone(0x200, &(0x7f0000002640)="5a7cbcefa8b7a74f8bf1", 0xa, &(0x7f0000002680), &(0x7f00000026c0), &(0x7f0000002700)="6f4f587f7da8801dad8be630b1836f9c7c64613243b173bbd01741450aaf09a84da4754b69c08114bf96217272b2ddb91952e2bfef29f10c05804208bf14f9a4539bfb04e5617b4703ef73a0a0c4c389af6f90016482768b881fa662ba6340599846c47de7e8e9") bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002800)={{r18, 0xffffffffffffffff}, &(0x7f0000002780), &(0x7f00000027c0)='%pi6 \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002a40)={r19, &(0x7f0000002840)="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", &(0x7f0000002940)=""/228}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002b80)={@fallback=r17, 0x1f, 0x1, 0x6, &(0x7f0000002a80)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000002ac0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000002b00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002b40)=[0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002b80)={@fallback=r17, 0x1f, 0x1, 0x6, &(0x7f0000002a80)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000002ac0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000002b00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002b40)=[0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup(r16, &(0x7f0000002c80)='syz0\x00', 0x200002, 0x0) (async) r21 = openat$cgroup(r16, &(0x7f0000002c80)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000002cc0)={0x2, 0x80, 0x3, 0x8, 0x7, 0x4, 0x0, 0x3, 0x6190a, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x190, 0x7}, 0x108204, 0x0, 0x200, 0x7, 0x4, 0x7, 0x2, 0x0, 0xfff, 0x0, 0x5}, r15, 0x0, r20, 0x9) (async) r22 = perf_event_open(&(0x7f0000002cc0)={0x2, 0x80, 0x3, 0x8, 0x7, 0x4, 0x0, 0x3, 0x6190a, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x190, 0x7}, 0x108204, 0x0, 0x200, 0x7, 0x4, 0x7, 0x2, 0x0, 0xfff, 0x0, 0x5}, r15, 0x0, r20, 0x9) perf_event_open$cgroup(&(0x7f0000002c00)={0x2, 0x80, 0x2, 0x9, 0x0, 0xf8, 0x0, 0x3, 0x0, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xd0, 0x2, @perf_bp={&(0x7f0000002bc0), 0x4}, 0x8200, 0x2, 0xffffff2f, 0x0, 0x3ff, 0x7ff, 0x5, 0x0, 0xb, 0x0, 0x3}, r21, 0x5, r22, 0x8) (async) perf_event_open$cgroup(&(0x7f0000002c00)={0x2, 0x80, 0x2, 0x9, 0x0, 0xf8, 0x0, 0x3, 0x0, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xd0, 0x2, @perf_bp={&(0x7f0000002bc0), 0x4}, 0x8200, 0x2, 0xffffff2f, 0x0, 0x3ff, 0x7ff, 0x5, 0x0, 0xb, 0x0, 0x3}, r21, 0x5, r22, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002d80)={&(0x7f0000002d40)='alarmtimer_suspend\x00', r17, 0x0, 0x4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002e00)={&(0x7f0000002dc0)='nilfs2_transaction_transition\x00', r17, 0x0, 0x4}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000003f80)=@generic={&(0x7f0000003080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x18) (async) r23 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000003f80)=@generic={&(0x7f0000003080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000004040)=@bpf_tracing={0x1a, 0x18, &(0x7f0000002e40)=@raw=[@ldst={0x3, 0x3, 0x1, 0x7, 0xb, 0x6, 0x8}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1000}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xb}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x400}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x5}, @alu={0x7, 0x1, 0xa, 0x9, 0x1, 0x10, 0xfffffffffffffff0}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000002f00)='syzkaller\x00', 0x6, 0xab, &(0x7f0000002f40)=""/171, 0x40f00, 0x50, '\x00', r6, 0x1a, r20, 0x8, &(0x7f0000003000)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000003040)={0x4, 0x8, 0x800}, 0x10, 0xb9b, r16, 0x0, &(0x7f0000003fc0)=[r18, r23], &(0x7f0000004000), 0x10, 0x3ff}, 0x94) 2m14.472905246s ago: executing program 1 (id=1129): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000c7acfe350000000018110000", @ANYRES32=r1], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x51}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 2m14.240551538s ago: executing program 1 (id=1131): bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x40}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000c00)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf20000000000000070000000f0000003d030100000000009500ffb1000000006926000000000000bf67000000000000150002000fff52e84407000009300000240600000ee60000bf050000000000001c63000000000000650700000200000007070000fbffffff1f75000000000000bf54000000000000070400000410f900bd430100000000009500000000000000050000000000000095000000000000001c15a3ce747c693a74b62fd0758b15f09429c09074bc4b2bd2dc480dd7a064b8673e2060162cc43bcba1060999eef9d60bb39d0af449deaa27ea949e8f9000d885deea2783835e29eba8546fc020c1966f8b5f32b095f566edf66b7751828da9dbd5b996b9e8d897e461c01c697671d100000000400036c17fb01dde179c1f2686ee970d6482a2e71a55d6ebe700b3be005e47ef55e0dd81244b18590e000000000000356d82e43407a6d7fa94b21002f06cd247b126b6349ab62d7b07ba0a71a72145edade9941f49f300a8c8913e0e4ea9e4c77740ab3312edee62a4dc2fc85755d387bfa1bc9b49da28724ba9cd79fbee8f97af876d0e30c19555ffdd7d73815b459f4763c6222175c974be2f76fb5f330b015a68587a75c013000000000000000000000003000000000000d6ddc46e58eff8f4fbadfc6a3af8123b7f42407107000cdc9d7820c4eb67cc0f8b5fe9258eeacb5776aebbab3d5c55020000006082778366dadfc36029633e0514cbcee1f3928970bde148c940434f33acd377cbad17673b2d30b6339255c98eba97efb4e9ac1f11be815dd6045592edcbee7f253ec74c7c1313505bd7ff8fd58b3a6569c91dbdef1df585aeaea7346a2a65caee5c85f9eddeeeee3c8a2e523c864ac430eb47cb4d0c8767b9d4125661b5a1a170c04b64da3a99ddb93bf14fae3ca2d1e882375b8dbac83978e136c34f90b33cc0eeb57debcfe26589efc08124d5d62a7e593c9738a50171adf051ea4f07e7e7e770c2016eeacbe8511afffffbea75759a1ea5404f5453c0b5c46c9700808c096cf8cf5223f341cb003841b5cd224c1b381d56afebe9f99a00e3cd94dc0bb7af9e8709db487cc4d9b3b96723d69d512ddd57b0dee9b9f6ae80a502cce352098603e75414c91fce6c86287945bd8d258442760000ff010000000000000000000000300807f2f3906c1d45d05ba9df828d35376fed399fa311ff63a34f0c0b82b4f2825e729eb9b7f4c9ab3be5bc011ff29904bbc424880247fabe7325a6e8d139e99d2b2fbf7e84fca3b21c78840b858ce900a4eb9c2b8b9b7fb664d2aeac991ca09b1afc0ef7aed4541a2f7275130a9fa3853481c81e919c000000000000000000000000b1e0e4b55e0d5d8c657b4853fc18ec43be33e5f971cceda04d95c87489910ce692ee55c536d1671bffd4c9b98efb741b13f0ab26ac191c74"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000001811"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r4}, 0x18) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={0x0, 0x91b1400079c52c93}, 0x105c34, 0x8000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r3, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000180)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0], 0x0, 0xdf, &(0x7f0000000280)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x7d, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000005cf4cad1530b579c39c055fcea1fc74502906ff1f13c9ea7"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800fa06b0dff05652ae00"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 2m12.530273629s ago: executing program 3 (id=1139): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='mm_page_alloc\x00'}, 0x10) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x2000010}, [@generic={0x6b, 0x1, 0x1, 0x4}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000fcff000000000000000000850000002200000085000000070000009500000000000000e3b791f4a4a3972200e1d2acd44498f2cfbf4ae21867953463a9211404aa0e942d2460473901162b5db03303d2731c0e8ff5f76396f3a69ef52a00e8ae396de506de923c26c5bc87e3461c93cca3b186787c11d06d49d19896534d476fb6550cd031867572ce45503f6f46284b1ce64c582ae6c0e66319f800991ca2b186824cd560affec254"], &(0x7f0000000080)='GPL\x00', 0x4, 0xcb, &(0x7f0000000340)=""/203}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000005000000fd0900008400000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="feffffff00000000000000000000f9b371ff0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x10, 0x3, 0x9, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r3}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES16=0x0, @ANYRES64=r2, @ANYRESHEX=r4, @ANYRESDEC=r0], 0x50) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1e0000000900000007000000db000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="030000000500000005"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x5, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r3}, 0x38) 2m12.381822023s ago: executing program 3 (id=1140): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4020940d, &(0x7f00000005c0)=0x80000000000004) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x4880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB="18020000040000000000000007000000850000002c00000085000000a000000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1f, 0xf, &(0x7f00000001c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0xf}, {0x7, 0x0}}, {}, [], {{}, {}, {0x85, 0x2c}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, 0x0, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x0, 0x2107, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100ffff00000000010000008500000007000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f00000003c0)=0x400) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd6372ce22fdb921"], 0xfdef) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) 2m12.343702907s ago: executing program 32 (id=1140): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4020940d, &(0x7f00000005c0)=0x80000000000004) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x4880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB="18020000040000000000000007000000850000002c00000085000000a000000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1f, 0xf, &(0x7f00000001c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0xf}, {0x7, 0x0}}, {}, [], {{}, {}, {0x85, 0x2c}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, 0x0, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x0, 0x2107, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100ffff00000000010000008500000007000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f00000003c0)=0x400) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd6372ce22fdb921"], 0xfdef) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) 2m12.235605957s ago: executing program 1 (id=1141): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000200000d02000000000000000200000000000000000000000000000000000002"], 0x0, 0x42}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) write$cgroup_devices(r1, &(0x7f00000005c0)=ANY=[], 0xfffffeff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000f80)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xf, 0x1}, {0x0, 0x5}]}]}}, &(0x7f0000000e80)=""/225, 0x36, 0xe1, 0x1}, 0x28) 2m12.138295667s ago: executing program 1 (id=1142): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@func={0x2, 0x0, 0x0, 0xc, 0x2}, @func_proto]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x34}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}, 0x10140) 2m12.133472198s ago: executing program 5 (id=1150): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000780)=ANY=[@ANYRES8, @ANYRES32=r1, @ANYRES32=r2], 0xffc0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0xe, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x3}, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x8}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000009e0000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r6}, 0xc) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r9, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0}, 0x28) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000010340)=@base={0x18, 0x4, 0x3399, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, r11, 0x4002, 0x5}, 0x50) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbd, 0xbd, 0xc, [@datasec={0xc, 0x6, 0x0, 0xf, 0x1, [{0x2, 0x10000, 0x7}, {0x3, 0x7c876897, 0xffff176e}, {0x5, 0x71, 0xffffcee1}, {0x1, 0x1, 0x7ff}, {0x5, 0x1224, 0x1}, {0x2, 0x8, 0x8b}], "ea"}, @volatile={0x10, 0x0, 0x0, 0x9, 0x4}, @var={0xa, 0x0, 0x0, 0xe, 0x3}, @var={0xa, 0x0, 0x0, 0xe, 0x5, 0x1}, @ptr={0xa}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x8}}, @type_tag={0x4, 0x0, 0x0, 0x12, 0x2}, @typedef={0x4, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x74cfbb4a4360362a, 0x5f, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x0, 0x2e, 0x30]}}, &(0x7f00000004c0)=""/101, 0xe4, 0x65, 0x1, 0xc0000000, 0x10000}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1e00000005000000030000000700000000850000", @ANYRES32=r9, @ANYBLOB="0600"/20, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0000000005000000020000000800000000000000", @ANYRES32=r12, @ANYBLOB="000095fceb0000"], 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x51, '\x00', r10, r3, 0x3}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8912, &(0x7f0000000080)) 2m12.017555119s ago: executing program 33 (id=1142): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@func={0x2, 0x0, 0x0, 0xc, 0x2}, @func_proto]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x34}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}, 0x10140) 2m11.973934014s ago: executing program 34 (id=1150): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000780)=ANY=[@ANYRES8, @ANYRES32=r1, @ANYRES32=r2], 0xffc0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0xe, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x3}, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x8}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000009e0000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r6}, 0xc) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r9, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0}, 0x28) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000010340)=@base={0x18, 0x4, 0x3399, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, r11, 0x4002, 0x5}, 0x50) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbd, 0xbd, 0xc, [@datasec={0xc, 0x6, 0x0, 0xf, 0x1, [{0x2, 0x10000, 0x7}, {0x3, 0x7c876897, 0xffff176e}, {0x5, 0x71, 0xffffcee1}, {0x1, 0x1, 0x7ff}, {0x5, 0x1224, 0x1}, {0x2, 0x8, 0x8b}], "ea"}, @volatile={0x10, 0x0, 0x0, 0x9, 0x4}, @var={0xa, 0x0, 0x0, 0xe, 0x3}, @var={0xa, 0x0, 0x0, 0xe, 0x5, 0x1}, @ptr={0xa}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x8}}, @type_tag={0x4, 0x0, 0x0, 0x12, 0x2}, @typedef={0x4, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x74cfbb4a4360362a, 0x5f, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x0, 0x2e, 0x30]}}, &(0x7f00000004c0)=""/101, 0xe4, 0x65, 0x1, 0xc0000000, 0x10000}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1e00000005000000030000000700000000850000", @ANYRES32=r9, @ANYBLOB="0600"/20, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0000000005000000020000000800000000000000", @ANYRES32=r12, @ANYBLOB="000095fceb0000"], 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x51, '\x00', r10, r3, 0x3}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8912, &(0x7f0000000080)) 2m11.823847919s ago: executing program 7 (id=1144): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000340)='percpu_alloc_percpu\x00', r3}, 0x18) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000040)='percpu_alloc_percpu\x00', r5}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x481, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x7baf376a, 0x3, 0x3, 0x0, 0x2}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x23, 0x1, 0x9, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xf}, 0xd806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 2m11.698382061s ago: executing program 35 (id=1144): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000340)='percpu_alloc_percpu\x00', r3}, 0x18) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000040)='percpu_alloc_percpu\x00', r5}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x481, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x7baf376a, 0x3, 0x3, 0x0, 0x2}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x23, 0x1, 0x9, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xf}, 0xd806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 2m11.695713871s ago: executing program 6 (id=1143): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x1000000}, 0x80) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="000000000000000000002c7cf253ae88b30f0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x8502, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000100)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00\x00\x00\x00\x00', @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1, 0x0, 0x0, 0x17}, 0x0) 2m11.695113862s ago: executing program 36 (id=1143): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x1000000}, 0x80) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="000000000000000000002c7cf253ae88b30f0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001}, 0x8502, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000100)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00\x00\x00\x00\x00', @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1, 0x0, 0x0, 0x17}, 0x0) 3.970349256s ago: executing program 4 (id=2325): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000500)={0x2, 0x0}, 0x8) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x1, 0x0, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x50) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x4000, r2}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x3, 0xb, &(0x7f0000000340)=@raw=[@call={0x85, 0x0, 0x0, 0x30}, @generic={0x5c, 0x3, 0x2, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x1}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x8}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f0000000180)='GPL\x00', 0x1, 0xd, &(0x7f0000000200)=""/13, 0x41000, 0x8, '\x00', 0x0, @sched_cls=0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0xc, 0x7f, 0x902}, 0x10, r3, r2, 0x1, &(0x7f0000000680)=[r1, r1, r1, r1, r1, r1, r4, r1, r5], &(0x7f00000006c0)=[{0x0, 0x5, 0xa, 0xb}], 0x10, 0x400000}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000280), &(0x7f00000002c0)=r2}, 0x20) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2000000000000058, &(0x7f0000000440)=ANY=[@ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="6f50aa8100000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff3, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r12}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x1c}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) 2.794642372s ago: executing program 2 (id=2334): bpf$MAP_CREATE(0x0, 0x0, 0xff6c) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000280)=ANY=[@ANYBLOB='+cpu'], 0x5) write$cgroup_subtree(r8, &(0x7f00000001c0)=ANY=[@ANYBLOB="f163707520"], 0x5) openat$cgroup_type(r6, &(0x7f0000000040), 0x2, 0x0) r9 = syz_clone(0x41333280, &(0x7f0000000440)="bc50e27e3a956ae943dbfb3521ad8298d88f4a7625b38d2fdac16984f7afc9c114211d9f705e8fb82902a78a06bd6bdf1110a89dde018a1d61b1251a83f3e9ad5244ad74f63db3752ca492fc6e8978e0adb960f61f7d13039c244c4b009dc851eeed5c006be54f1f7c0a4ad2989e3f322b265228d0317e43f13ba5deff1c8e2b9a1ee02b44694a7e68f0d7ea52f99faae5c44ea9da952f6eed3a91b5a7b4ae221b845065f8d80f636a22e0055ff26433c81c5e2429edc4a8e2c6769da1d9bf599122", 0xc2, &(0x7f00000000c0), &(0x7f0000000240), &(0x7f0000000540)="d7bcc98b5a06606f025e9a70b27a915f25e2451d23f03af697f24313ccfb2dd98438ecdaa5d0e045f5ff9b3eaa23260340428f32606c927ced634d47059b5beaaf8f08284a8d413648df5fadbacc4c2bd831413527c9ab6be9bd056c9ff45855284ba0bdd81e283b0e27942aa6d6d88c9f5365cd23abbc347c230fd9845e1a2c6bad60d76fa3659a9d24e1a6") write$cgroup_pid(r0, &(0x7f0000000300)=r9, 0x12) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r10 = getpid() syz_open_procfs$namespace(r10, &(0x7f0000000180)='ns/ipc\x00') 2.7226579s ago: executing program 4 (id=2335): bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x8000000}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) 2.666247385s ago: executing program 2 (id=2337): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00"/13], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000600), 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ca8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10003, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf7cf39e3100c8acaa47684f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d7559f3b14820ed58b15627c95aa0b784625704f07372c29184ff7f4a7c0000070015006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45e000000000000041201baa80b0b8ed8fb1ec577c377f627daaf787a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465a932b77a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900ff0000000010c63a949e8b7955394ffaff03000000000000ab87b1bdeda7be586602d985430cea080000000000fb1a26abfb0767192361448279b05d96a703a660587a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aab926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb155481ef836eb0f8c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaed2b25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec0271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761036eafed1fb2b98b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890cec55bf404e4e1f74b7eed82571be54c72d978cf906df08f11f1c4042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe514283707c70600000000000000b7561301bb997316db01ee601f2c9659db9bc04f7089a660d8dcc3ae83169cf331efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a515d83129cd857c775f9e7d6101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbe3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f000000009191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562e00e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb2214209ed2d5d776e22a2a798de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b55ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f608ce27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e30400000000000000000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270b939b81367ac91bd627e87306703be8672d70d1ab57075228a95d32f46ed9bd1f00fb8191bbab2dc599dda61ee2010000294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf01cfaed9ef0ce21d69993e9960ff5f76015e6009756237badf4e7965bfe2777e808fcba821a00e8c5c39609ff854256cb490000000000c1fee30a3f7a85d1b2b458c77685efc0ceb1c8e5729c66018d169fc03aa188546bb2e51935ab9067ec3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f626602111b40e761fd210819203828b202779d386ed295f023c67d867014d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff00004043060000005dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df40600000000000000e9b49a1b36d48a44ba6a4530e59bec53e876dc660dd6d89f80a4377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f00000000010000000000000000000057d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b0600b805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fb03b84f63e022fe755f4007a4a899eaf52c4f491f1e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1202000000b59fed817072a0da60160761fd3dffda0f7c742eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c7000000000000000542954c167dd9b4acd946ffffffffffffffff1389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c9e281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b630500163aff094059e626766845fd779c9e6cdbbd64c2499ce3ffe2fef03f7cdd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba3c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63e4581d5cc41cbde2ba66adc1168070c8c6e18a6e452a31bde54ad3e16304d06a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f700400fa0c61d5fe6d8ff353f631080405547d65375ae04f44f0c2543c772c5ccb137be7dc87746e1785a8214454d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b036e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e010000005a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb3985b7581bb5584c53984ba9c3340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1428c0805b4031a667e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f1400010000ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1b0100448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a9cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab9100781b9912160a3fd2a2e74dd690c57bdfdc1f069f9491bca7a8c59363799be7005c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c1227c8bed10591958c906321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b863af34bac64c247672a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677ec97c5c568a89d6e36b165c39132a0f27080ece2a94c360b002c77f82662675a7713c7067081cac1599a998c41ff4754268ae1676384ff799783f55d7e5a1a0920300000000000000d98440c355927629f2bcf9dc215a18ca0265400abf38e90000000000000000008faf2cddffbfa66bf32eb718e88ec75603ed7c7a8825ce0f27a114bd7a4ab74d0c7b8d90ccc1c3ca6620def782e24d75aed70eb676437f62677a69e0994cd82d72e95493c830fe9515329f40b7025326dec33a527c5d999298eaa3690fd0d38a02fc6e0bc16dbe19f353027edc014411e1138087221492f5d5e5cc9d0a1acd3f581eda9a807aa0e609f935f626d96351e0ff116686cbeb8939feecd5dac8cf45101942ce18e57bb7f337df5435bcf7e504b7c427f70a10e1cb8993a661306a0576b638a0171e6800b5b35589d676eb30ed1a72e8f7b057eb281c4504195635b6b285ebaba019913a2520e43ed790231f047f7d3789c10ae7d724929f77aec1d33d9587580268ee14396f71e7ef588cb2560d6bd0795a9b97281229eb16de286553469fad7214ffc3e416f8b8e442dce1d37f9b1c88a5d8a8d9f2fe45bd8df213ecb4194c8554aea13cadcd502e51f6fec80418e772b5bd8d0228949058038b185909ee542848680f9ad43f4057d676d5e21ae3d7e0e4a28c03f112a94707f032b35915e42993ff148291b8babe026646ee41905992db217561b90811c4702a14f312fe5d2ae7257db6be1034cc1c346b76a853ce274bf0435e18f7e86c660c18c872a4882d21db2046a1893b83c62d61bfeadc1f913e4cab2b897e096dd3fe3525090410cb23bab36cdf200a36014032cf6e5121803c5a0c4a273a19f340163fc6265441d513a1294b8439276394945d94a589708e32a1cb30a8b07b391201385e0b92ecbb7b13d7a87284164018ace6ce58a82c5de321452461089cdd69259f5390f5f508646a524490583c30630bedb47e158ad41c0a653e86a4f4f255cd2a6e95f33b586823aef5564d9de1f5bdd8c80e193f0597b8003860302cd243c00bc5a82c52afb115d16258d507937966bb89409d6d47b8b652d0761d7c72875ae1efb9bc7c6807c2d783e31fd9cd7e84d3d50d8fc44ab8ac9ccd2c0d42e3bd4c029241320446bbf47e23d1320de30fbdf7ed13f80c28fb5c13fccc2e3f73509bdcddad8a2fe48cdd61f2f43611704af64eed8b0cbbd08754f93b8f3d6347aad5cde1ccc5cbd5eaa87e52cea257c856a4af5243eeb5e89f0000000000000000f420df5e4c6d856b3d55e455c08110b2ef4255a38f81555e8e1f22d59c0bc3c9013e66a1f5bda1b695e1602c0afb5c35b2f68f3b151b1e869f40ff4d1bef5e926e1ff95f6321131e4cb797f53455a093a95e67605222d6acc29c46e5db1ef3b8b07e2169fb24ced4b3ae87ebeca06df93212e465bbd1a7e41df2e1a0d508f86cfc7a469ac682685c44692877d03c34c23a65d2677acc73b5d276fdebd685c9b7a079eae228d8426188cb19b083548f5f29e493ab079f33d1965dcbb165015c46998ad410d60cc65fcfa73bd65a43fc024455c4bf530d663976cf71490577251780ab6b1cf8d397444b5be575229f687a3d95ea6b2aa62fce8acb3d4a6a130b4fefa55d0c1d6f3fa448ee24e588e2965c9a442f0baf90923dda91a6850fb7b9c7f432b63001423fedcf053fa28024cc9a178a07042dabc07176fc524032c2edb340c9c18a83565c431aeb0c869683507255254430f90f61e4eca9c8fa98c000b35fec357ee1ebd08439bd95c1ab0753dfd2603d1608bd8c589a1e160000a6ee0ad13346e08738c2d7b00b5d121d918f1dc8bceded939fa8605b54b37cdfcea0bf2bc63e655dc04a2e50212ff89d6587d49896ce18916cf3adc12839c345ca91bb232b891fae2fdd68aaa38281c0feb2c107af3e080d6cdd1c6646ec6804d7e9960c02aa0db9eda24bbcb287fd2a890fa7f9d6ae0c0b1f8dd1603c9ea2f66b572276f96a28b5b6dd9f9bf6ad4bdaa2139b90faf1f40b0f141258578bd825daaaf718d21b7ac05fe5d1b699e5422ca341fe1c944f68fe3a6d783dcf30b0e09d7688f696883b61cb64464b04d351a0a69b0733c348049b0430ed40e200f4ff0000000000000000000000996bcc1b721b152c892fab887e7d20466d90c049c0fdf51dcc16d226a2619c6f47bc25b7f5df5c09fed638922ed127ab36aa7b0c58a2ce5894b1b0f5375d340d96b69b966b05daaf585121a9c7605ed8e9964eef1f14b74cbb2ccdadc6d0b77cf0492b75e1cd11bfdcfddde91b20366715ba0cbe1041be2a65c25d7ca15ef8b71bd2ab9a4294899a1964b0152518fc2ac15a728bcb9e2bc4b551dfdf9011a2a607bc39ad2c4d7c64dcf967724e9b63c397d5265ad3f1da4395a5a800d8845257dcbf210d4f00fe0bd3deed05e506736e6bb6d40ee6cb960bcdb33633ee87f82beb665a9a4c2d4d2b06479ade3a4cd6bba765c9f52b52a0bdd0849ab92baae3775570accb5a57ee9f0035fc6d3df4eebec2e7eb4ff863d3979a20f4428ddca471037b49d4fd130743a97faa02c293b721e52bf53d64c6585e138162331ef98792e1e9b21a6a084fb7b42c64062ef1323a8a65a8ed6038f274f28ff4f78136a1ef108efbe8c4f4e347d50dcdbc33bf3ade4c3a39d316061930d7dd39b8acdecc3f27830e3eda40e648328d95a9aee65a9dd09fd4e96d5b852025dc53ec3f30cc753e6a796084b4e34f521dbb230ae0f3b79142073d437e1fd22d3b7503ffa95b1d5c7740b0ecbfd35dc0f8af895583dfcc2689f6e02c2dd4b57f3dcac54f40da013eb221fa3d65de760576031052c25a96ed4b20230b36d46d3d3fd6bb1d77cc8a48a6b10fa0149e55ccde4a2b26cca2d1ca9191c74ab006a602543fc24d1283e353cfb917620000000024bf3eed258c02a591ec4cd295212d9a98d38745f6f6c4530900000000000000f184f239098bf32551c7cf454e2865974f6520112743f73c619c3cab5609e00178f7393e53462f31559220c026bbde09837bf1b3ffe748a3247c9569f0c5e99f4494f93e0fa1badca90c888616eca97bddabd8003fc12a084d4b11d841979e161b998ddda92f194c4ec7947b7b303be11e0962d429a2c542a28c4932e14c123dfe2b8ec47a11cce134fd6e42a9f4e00ab6de6b45"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000030c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe0c, 0xffe0, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847fe803500121100632f77fbac14141dac1414", 0x0, 0x71, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305829, &(0x7f0000000040)) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) 2.665701745s ago: executing program 4 (id=2338): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x3, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}}, &(0x7f0000000080)='syzkaller\x00'}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r2, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)=r3) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x8}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x29b4}}, @func={0x8, 0x0, 0x0, 0xc, 0x3}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x3a}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3}}]}, {0x0, [0x5f]}}, &(0x7f0000000980)=""/4096, 0x67, 0x1000, 0x0, 0x94, 0x10000}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 2.21407553s ago: executing program 2 (id=2340): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x2, 0x40, 0x40, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)="f242d72f369babc1046bc51a047edb28622fef5cc87adcd8f25244edaa4241bdbc32e53df80b916371af159201a2c1ecdaca8975e9873c031b8b23c8838855c12658c683fc1447a42fab08", &(0x7f0000000000), 0x1000, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x7, r2}, 0x38) 2.21126242s ago: executing program 2 (id=2342): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0x1}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="00000000000100000200", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={0xffffffffffffffff, 0x0}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r4}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x1, 0x4, 0x6}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 2.20817163s ago: executing program 4 (id=2343): syz_clone(0x1806000, &(0x7f0000000200)="dd3097badb90026dc453733cee080e6df6ddb96fee3e33dddc6c3907bdb3c818dc86df94484aa1f47d28fe13c965b7107c83142c881c6807fd01872bbc3c5e8ed11c7daababe2ab3555931c08b7c0006da066bf1165715ca83d32f2bacb2df12ebaab14ce91fb037e8eb13cf", 0x6c, &(0x7f0000000000), &(0x7f0000000080), 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYBLOB, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xf, 0x4, 0x4, 0x12}, 0x50) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f0000000280), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x1008}, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) 1.946616046s ago: executing program 9 (id=2345): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r9}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) 1.856160755s ago: executing program 0 (id=2346): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.71303111s ago: executing program 9 (id=2347): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x2, 0x40, 0x40, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)="f242d72f369babc1046bc51a047edb28622fef5cc87adcd8f25244edaa4241bdbc32e53df80b916371af159201a2c1ecdaca8975e9873c031b8b23c8838855c12658c683fc1447a42fab08", &(0x7f0000000000), 0x1000, r3}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x7, r3}, 0x38) 1.640925817s ago: executing program 0 (id=2349): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='freezer.self_freezing\x00', 0x275a, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000001c40)=ANY=[@ANYRES32=r1, @ANYBLOB="a9e9c56c486c2634bd9698c1cf521f5e754932d56381f8dbcba9102cf8ee26ca3bb756dba933e493698fc84b502899aa175b154c0b1f552c1341f987ba72af7ed5b43632a90e99b063ff87aa76db49957718bc0f06c5969ab6ac17a5a906baee10b6acc0e4d70795829aba0d47fe935151c34c69cc4c490e765920b17a9988359ae294998c65b45c5938508a557db385246f79c4973a1f540a1e7334d8e617b8bcfcfd0205063f0aa34bab8762cab81fdca250525a5c5cdaaed68bdc97f80f374c8dece6639ffaf7f7b631c960e454139e43da0488d71ed8ac5d1b8114846bced397c39b7cfbf813b0e57a2455bb9a8397e41d4c85515543ce6833888e5a", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffcc4, r2, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x25, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r4}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYRES16=r2], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0xe, 0x0, &(0x7f00000003c0)="131c8701feaa16bca4ac74ab821d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000400)=r1}, 0x20) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x5, &(0x7f0000001bc0)=ANY=[@ANYRES16=r3, @ANYRESOCT=r9, @ANYRES8=r7, @ANYRESDEC=r5, @ANYRES64=r2, @ANYRES8=r3, @ANYRESDEC=r8], &(0x7f0000000680)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0xc4, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xf, 0xc, &(0x7f0000001f00)=ANY=[@ANYRES32=r2, @ANYRESDEC, @ANYBLOB="00f6ffffff000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085000000970b8e25edc736a94de52ff55d8821493a299f00a20dcd5573e21706b59a81b6bfe1736907a7c3cd48ad41b1e9f491e777a58840d14a84064ad0b3f330935180"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8941, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00'}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000006c0)={&(0x7f0000000800)="138747e3e1ae660723e330af6bd01f77a948eee75a7f36680b8e7eec0c7576eebe0b1ad41f3e714d8415fe5279fbc22729f377df702f1556ff20e0a52f6b6aecc1efbf1162e64129ef4d1264ac718747f20120139f8902d86a9b2634ab34a2962359a5dc5e8a89f6e26daadc", &(0x7f0000000980)=""/4096, &(0x7f0000001980)="a74df48e86b6849dbc28e258f6c9b4386e1b336279c6ffc2d5a20f7e37c0f0b6b52440be5bf16cf19d5637c937f90bf37fb782a4da62e19d0d8a097127862cbd09a0bcd650728468e81e44e147799f764048f9", &(0x7f0000001a00)="2e3868db170e58fc6a205e47a0f7ec26b8b125290ff920645dba01c35b9d3ede4c0f776d959736b6ea04a933101ddac2201390083d8e9146dda1b8d07dde8445bfffae70ddba633008a698b77bf6beff6c5377048a55f57fc4235438c5f6222cee8950419929f0b336b2ae38edf982e8a3d0fb", 0xa8, r1, 0x4}, 0x38) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001a80)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000000000000000000000000000850000000500000018010000204d3c90e07ce854e85300646c2500000000978320207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xf561cb1c93df6985, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYRESOCT], &(0x7f0000000340)=""/142, 0x4e, 0x8e, 0x1}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000003c0)="e097566f5bec64466cf0925782dd", 0x0, 0x8c9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r13 = openat$cgroup_int(r12, &(0x7f0000000040)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r13, &(0x7f00000000c0)=0x100000000, 0x12) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.428400468s ago: executing program 0 (id=2351): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000500000085000000ba000000a7000000000000001800000000000000000000000000000095000080000000009500000000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0x6c, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) close(r0) 1.31083206s ago: executing program 4 (id=2353): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000000200)=ANY=[], &(0x7f0000000100)='GPL\x00', 0xbff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37}, 0x94) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000000)={@cgroup=r0, r0, 0x2f}, 0x20) bpf$BPF_PROG_DETACH(0x1c, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32=r0, @ANYBLOB='/\x00'], 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000071111e00000000008510000002000000b7000000000000009500c200000000009500001200001000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x2, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @alu={0x4, 0x1, 0x8, 0x0, 0x7, 0x4, 0xffffffffffffffff}], &(0x7f0000000280)='syzkaller\x00', 0x4, 0x85, &(0x7f00000006c0)=""/133, 0x41000, 0x2, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0x0, 0x6, 0x9}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000780), &(0x7f0000000840)=[{0x4, 0x1, 0xb, 0x1}, {0x3, 0x1, 0xa, 0x2}, {0x5, 0x9, 0x7, 0x9}, {0x1, 0x1, 0x10, 0x2}, {0x4, 0x5, 0x4, 0xc}, {0x4, 0x4, 0xf, 0xa}, {0x4, 0x5, 0xc, 0x8}, {0x3, 0x4, 0x1, 0x5}, {0x1, 0x4, 0x3, 0x5}], 0x10, 0x6}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x21c43, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'caif0\x00', 0x2}) ioctl$TUNSETDEBUG(r7, 0x400454c9, 0xffffffffffffffff) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x1000000}, 0x50) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000180)=ANY=[@ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r8}, &(0x7f00000006c0), &(0x7f0000000700)=r6}, 0x20) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@o_path={&(0x7f0000000500)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{0x1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)=r0}, 0x20) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x31, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000009000000000000000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200000000000085000000860000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000008500000006000000782300010400000018420000060000000000000000000000b7080000000000007b8af8ff00000000b7080000030000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a50000004a200a00ffffffff18330000010000000000000000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085ffff000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0xb, 0xaa, &(0x7f0000000380)=""/170, 0x41000, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0xd, 0x3ff, 0x1}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000640)=[r8, r10, r11, r12, r2], &(0x7f0000000680)=[{0x2, 0x5, 0xb, 0x2}, {0x29, 0x3, 0x8, 0x5}, {0x2, 0x3, 0xb, 0xb}, {0x3, 0x3, 0x1, 0x8}, {0x5, 0x5, 0x8, 0xa}, {0x4, 0x5, 0xf, 0xa}], 0x10, 0x10000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) recvmsg$unix(r13, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)}, 0x2020) 1.244187296s ago: executing program 2 (id=2354): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x0, 0x0, 0x0, 0xe, 0xffffffffffffffea, 0x0, 0x40f00, 0x50, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="143b000000000000020000000500000002800000", @ANYRES32=r1, @ANYBLOB='\x00'/20, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="01000000050000000500"/28], 0x50) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xf, 0x4, 0x4, 0x12}, 0x50) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000800)=ANY=[@ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="0500"/12, @ANYRES32, @ANYBLOB="3a58ba0d3d51e5b81f1a5ab7c5c3d6a5923ff6d1eef83e218765cb5c398c914dcafd386fb08dcc0f51285987b3081e575ca6bce593b8512a20133f87c47f7bae71d3be0818b4ed50b3e29d9ce08e74959fecd24c2deb86421c970999851c378aa5423d5d7350067ff8c6b4778a529d48914b4f49a1fe121755d802d34b2b37a6e34b8b3a0e78e1088ccf97080e7ecb26a60000000000000000", @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r7}, &(0x7f0000000280), &(0x7f0000000700)=r6}, 0x20) sendmsg$inet(r5, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r10 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r10, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.138021997s ago: executing program 0 (id=2356): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) 954.933425ms ago: executing program 0 (id=2359): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0, r0, 0x0, 0x952}, 0x18) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r1) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) (async) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) (async) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) (async) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r4, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r5, r3, 0x0, r2}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r7}, 0xc) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0700000004000000080000006304000000000000", @ANYRES32, @ANYBLOB="0000800000006200000000007100100000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r8, 0x0, 0x0}, 0x20) 838.745036ms ago: executing program 9 (id=2360): bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x8000000}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) 757.213514ms ago: executing program 8 (id=2362): unlink(&(0x7f0000000140)='./cgroup/../file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3}, {0x6, 0x0, 0x0, 0x4000}]}) 756.779365ms ago: executing program 0 (id=2363): syz_clone(0x1806000, &(0x7f0000000200)="dd3097badb90026dc453733cee080e6df6ddb96fee3e33dddc6c3907bdb3c818dc86df94484aa1f47d28fe13c965b7107c83142c881c6807fd01872bbc3c5e8ed11c7daababe2ab3555931c08b7c0006da066bf1165715ca83d32f2bacb2df12ebaab14ce91fb037e8eb13cf", 0x6c, &(0x7f0000000000), &(0x7f0000000080), 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYBLOB, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xf, 0x4, 0x4, 0x12}, 0x50) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f0000000280), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x1008}, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) 750.933905ms ago: executing program 9 (id=2364): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x80108907, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRESOCT=r3], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRESOCT=r3], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0a000000000000000020000000e1ff0000000600", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0c00000004000000040000000180000000000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000000000000000000000007f2ad690116be380f54cf80c56ef091d9f3044742766e52f0eec09ad96913bd2ee58acc093b94a15158c79ad1705090b734665a0cf6f8d5263370434c4b0ef7ad235cb10b0ee32e03c38c906db41f60eba8c5d14d774e73e5f2f610633c668ec560eb9984cc4f86ec23970a8ffa77df5c06b95d420e161a948fbd3b9f1a556a862828931f2eaa89e62d9fb50d558abacc922765bf4a674a2b2bea94d611c85dade1c789c809598fad7cd498008a2d95b59de", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x5d9080, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="00000000000300006608000000000000180000000000000800000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a0000000000008500000006000068badc718b2416ed6d3fd98046"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) socketpair(0x29, 0xa, 0x2, 0x0) close(r0) (async) close(r0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) close(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @random="2d311e000008"}) 718.998538ms ago: executing program 8 (id=2365): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1ff) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRESDEC=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, 0x0, &(0x7f0000000400)=r4}, 0x20) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x40, 0x6, 0x8}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r5}, 0x50) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000850000002a000000180100002025642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000089cdc832850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r7, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000000)="b9ff03318944268cb89914f00800", 0x0, 0x2005, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000004e8100000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_clone(0x10201000, &(0x7f0000000300)="72cba445930b2ae2e48895f195d0212591e89d49df30410024a53a0c5d9f6c7805c9e41d5d3ba31b8a04ac4c03c7dcb191df5b2b90c5e7b7ce2d0f23f294c477b93f6e641469b873840100d80223f0b73e1da15ba82bf5493a43a10344a4b6a3d72356c8a128c0434027229f19f5c542717f5dad6031cb81d4667802ee26490f7e7e60cf34190d4840ec9aa17877f0131433dccaa21631e2de1eb52c6d82a5a4274071b3872037e6b4df7f4567ce87d5c47d949f61e09297c0483ca3c9f44f171b5b079f77435ec27b9c085a496bd9223848ee35edfb1c", 0xd7, &(0x7f0000000040), &(0x7f00000004c0), &(0x7f00000005c0)="eddb93948f4e900632be84c0539a7f67914fb7378f43bd0c5bcd3809eee16bc0853c27cca642aa86c111845894eadfc2d3006fb532") r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x1f, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) (async) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r9}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@struct={0x4, 0x0, 0x0, 0x4, 0x1, 0xfffffffd}]}, {0x0, [0x61, 0x0, 0x61, 0x61]}}, 0x0, 0x2a}, 0x28) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) (rerun: 64) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r10}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r11, &(0x7f0000000180), 0x40010) 551.906485ms ago: executing program 8 (id=2366): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x2, 0x40, 0x40, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)="f242d72f369babc1046bc51a047edb28622fef5cc87adcd8f25244edaa4241bdbc32e53df80b916371af159201a2c1ecdaca8975e9873c031b8b23c8838855c12658c683fc1447a42fab08", &(0x7f0000000000), 0x1000, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x7, r2}, 0x38) 522.331538ms ago: executing program 8 (id=2367): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@struct={0x5, 0x1, 0x0, 0xf, 0x0, 0x5, [{0x8, 0x201, 0x5}]}]}, {0x0, [0x5f, 0x61, 0x50, 0x0, 0x61]}}, 0x0, 0x37}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) (async) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001cc0), 0x0, 0x4000, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001a40)="408fd0050dc7945b48", 0x1, 0x0, 0x13}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001cc0), 0x0, 0x4000, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001a40)="408fd0050dc7945b48", 0x1, 0x0, 0x13}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x6, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x20000}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x6, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x20000}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r2}, 0x10) syz_open_procfs$namespace(r1, &(0x7f0000001380)='ns/mnt\x00') r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x8}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r3}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1b000000ab1668cc000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1b000000ab1668cc000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x8}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff8f, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3e, 0x0, 0x0, 0x10, 0xfffffffd}, 0x90) 493.051731ms ago: executing program 2 (id=2368): bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) close(r3) (fail_nth: 1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x4, 0x0, &(0x7f0000000380)="b9ff0308", 0x0, 0x0, 0x60000000, 0x0, 0x1, 0x0, &(0x7f0000000040)="a4"}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)=ANY=[@ANYBLOB="05000000040000000400", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x48) 176.283462ms ago: executing program 9 (id=2369): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) 176.057202ms ago: executing program 8 (id=2370): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x2, 0x40, 0x40, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)="f242d72f369babc1046bc51a047edb28622fef5cc87adcd8f25244edaa4241bdbc32e53df80b916371af159201a2c1ecdaca8975e9873c031b8b23c8838855c12658c683fc1447a42fab08", &(0x7f0000000000), 0x1000, r3}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x7, r3}, 0x38) 102.847809ms ago: executing program 8 (id=2371): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x2, 0x40, 0x40, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)="f242d72f369babc1046bc51a047edb28622fef5cc87adcd8f25244edaa4241bdbc32e53df80b916371af159201a2c1ecdaca8975e9873c031b8b23c8838855c12658c683fc1447a42fab08", &(0x7f0000000000), 0x1000, r3}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x7, r3}, 0x38) 83.748992ms ago: executing program 4 (id=2372): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1901], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r5}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000880), 0x12) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$TUNSETOFFLOAD(r1, 0x4004743d, 0x110e22fff6) write$cgroup_type(r1, &(0x7f0000000280), 0xfffffeed) 0s ago: executing program 9 (id=2373): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.201' (ED25519) to the list of known hosts. [ 25.205199][ T28] audit: type=1400 audit(1760662338.469:64): avc: denied { mounton } for pid=274 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.206827][ T274] cgroup: Unknown subsys name 'net' [ 25.228742][ T28] audit: type=1400 audit(1760662338.479:65): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.256871][ T28] audit: type=1400 audit(1760662338.499:66): avc: denied { unmount } for pid=274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.257086][ T274] cgroup: Unknown subsys name 'devices' [ 25.398279][ T274] cgroup: Unknown subsys name 'hugetlb' [ 25.404234][ T274] cgroup: Unknown subsys name 'rlimit' [ 25.509386][ T28] audit: type=1400 audit(1760662338.779:67): avc: denied { setattr } for pid=274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.533146][ T28] audit: type=1400 audit(1760662338.779:68): avc: denied { mounton } for pid=274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.555581][ T276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.558915][ T28] audit: type=1400 audit(1760662338.779:69): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.590581][ T28] audit: type=1400 audit(1760662338.839:70): avc: denied { relabelto } for pid=276 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.614525][ T274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.616451][ T28] audit: type=1400 audit(1760662338.839:71): avc: denied { write } for pid=276 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.651348][ T28] audit: type=1400 audit(1760662338.859:72): avc: denied { read } for pid=274 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.677720][ T28] audit: type=1400 audit(1760662338.859:73): avc: denied { open } for pid=274 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.563463][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.570756][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.578416][ T283] device bridge_slave_0 entered promiscuous mode [ 26.597716][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.604783][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.612679][ T283] device bridge_slave_1 entered promiscuous mode [ 26.625530][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.632995][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.640736][ T286] device bridge_slave_0 entered promiscuous mode [ 26.660131][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.667434][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.675165][ T286] device bridge_slave_1 entered promiscuous mode [ 26.688543][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.696071][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.703765][ T284] device bridge_slave_0 entered promiscuous mode [ 26.712372][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.719571][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.727154][ T284] device bridge_slave_1 entered promiscuous mode [ 26.786493][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.794202][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.801736][ T285] device bridge_slave_0 entered promiscuous mode [ 26.812671][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.820304][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.827905][ T282] device bridge_slave_0 entered promiscuous mode [ 26.838268][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.845417][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.853068][ T285] device bridge_slave_1 entered promiscuous mode [ 26.862904][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.870208][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.877933][ T282] device bridge_slave_1 entered promiscuous mode [ 27.094339][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.101534][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.109140][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.116776][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.125986][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.133056][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.140581][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.147731][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.161489][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.168837][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.176543][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.183675][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.202568][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.209791][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.217416][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.224895][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.247984][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.255259][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.262842][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.270353][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.314839][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.322527][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.330051][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.337921][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.345267][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.352902][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.360899][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.369060][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.376589][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.384134][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.392026][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.436829][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.446749][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.454952][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.462495][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.470678][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.479612][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.486899][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.494492][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.502876][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.511665][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.518884][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.526782][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.535138][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.542409][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.550051][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.557715][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.565169][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.573704][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.580765][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.588683][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.597131][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.604252][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.611811][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.620169][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.627393][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.634800][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.643163][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.650321][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.657860][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.665985][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.696362][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.705064][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.713559][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.722145][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.730485][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.739512][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.747716][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.756048][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.764238][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.772721][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.780946][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.789416][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.798431][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.806984][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.828306][ T285] device veth0_vlan entered promiscuous mode [ 27.838312][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.847100][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.856518][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.865053][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.873709][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.881808][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.889956][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.898555][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.907161][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.914828][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.923139][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.931583][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.942658][ T284] device veth0_vlan entered promiscuous mode [ 27.951256][ T282] device veth0_vlan entered promiscuous mode [ 27.957610][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.965251][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.973145][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.981380][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.989939][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.997543][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.014072][ T285] device veth1_macvtap entered promiscuous mode [ 28.027474][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.035882][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.043735][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.052156][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.060829][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.069555][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.077809][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.086337][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.094525][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.101756][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.109745][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.118579][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.126984][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.134021][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.149637][ T282] device veth1_macvtap entered promiscuous mode [ 28.160333][ T284] device veth1_macvtap entered promiscuous mode [ 28.168365][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.177434][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.186512][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.195320][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.204787][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.227364][ T283] device veth0_vlan entered promiscuous mode [ 28.237817][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.246432][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.254850][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.263330][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.271668][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.280457][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.289408][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.297829][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.306470][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.314612][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.323035][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.331686][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.340452][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.349065][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.357546][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.365337][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.385143][ T285] request_module fs-gadgetfs succeeded, but still no fs? [ 28.391738][ T286] device veth0_vlan entered promiscuous mode [ 28.407625][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.418460][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.428373][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.436665][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.444834][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.452694][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.480384][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.497582][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.515119][ T283] device veth1_macvtap entered promiscuous mode [ 28.529118][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.541233][ T286] device veth1_macvtap entered promiscuous mode [ 28.557530][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.575809][ C1] hrtimer: interrupt took 35944 ns [ 28.592465][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.636089][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.655803][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.715654][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.741855][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.770900][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.798132][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.151932][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 31.151948][ T28] audit: type=1400 audit(1760662344.419:111): avc: denied { tracepoint } for pid=406 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.466520][ T28] audit: type=1400 audit(1760662344.699:112): avc: denied { read } for pid=406 comm="syz.0.17" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.096849][ T369] syz.2.8 (369) used greatest stack depth: 22624 bytes left [ 35.833300][ T28] audit: type=1400 audit(1760662349.099:113): avc: denied { relabelfrom } for pid=478 comm="syz.2.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 35.938760][ T28] audit: type=1400 audit(1760662349.099:114): avc: denied { relabelto } for pid=478 comm="syz.2.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 36.257228][ T492] device wg2 entered promiscuous mode [ 36.308424][ T490] device sit0 entered promiscuous mode [ 36.453760][ T28] audit: type=1400 audit(1760662349.719:115): avc: denied { write } for pid=493 comm="syz.2.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.120043][ T393] syz.4.14 (393) used greatest stack depth: 22400 bytes left [ 38.496910][ T344] syz.4.5 (344) used greatest stack depth: 22240 bytes left [ 39.729330][ T548] device wg2 left promiscuous mode [ 39.811569][ T548] device wg2 entered promiscuous mode [ 41.214617][ T587] device sit0 entered promiscuous mode [ 42.573868][ T605] tap0: tun_chr_ioctl cmd 2148553947 [ 43.184545][ T28] audit: type=1400 audit(1760662356.449:116): avc: denied { cpu } for pid=618 comm="syz.4.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 43.407226][ T627] Driver unsupported XDP return value 0 on prog (id 103) dev N/A, expect packet loss! [ 43.469152][ T627] device sit0 left promiscuous mode [ 43.622771][ T629] device sit0 entered promiscuous mode [ 43.858549][ T636] device wg2 entered promiscuous mode [ 44.011290][ T640] device wg2 entered promiscuous mode [ 45.181959][ T668] tap0: tun_chr_ioctl cmd 2148553947 [ 46.014999][ T684] device sit0 entered promiscuous mode [ 46.356464][ T695] device syzkaller0 entered promiscuous mode [ 46.409682][ T700] device wg2 left promiscuous mode [ 46.515489][ T703] device wg2 entered promiscuous mode [ 47.010700][ T718] device wg2 entered promiscuous mode [ 48.093326][ T28] audit: type=1400 audit(1760662361.359:117): avc: denied { ioctl } for pid=745 comm="syz.0.105" path="socket:[16971]" dev="sockfs" ino=16971 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 48.849802][ T28] audit: type=1400 audit(1760662362.099:118): avc: denied { setopt } for pid=763 comm="syz.3.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 49.032740][ T28] audit: type=1400 audit(1760662362.189:119): avc: denied { create } for pid=763 comm="syz.3.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 50.049356][ T796] device veth1_macvtap left promiscuous mode [ 50.059425][ T796] device macsec0 entered promiscuous mode [ 50.155951][ T802] device wg2 entered promiscuous mode [ 51.715857][ T849] device wg2 left promiscuous mode [ 51.743586][ T853] device wg2 entered promiscuous mode [ 51.867938][ T855] device syzkaller0 entered promiscuous mode [ 52.486881][ T888] device wg2 left promiscuous mode [ 52.522578][ T888] device wg2 entered promiscuous mode [ 52.756716][ T900] device wg2 left promiscuous mode [ 52.827456][ T900] device wg2 entered promiscuous mode [ 53.597573][ T933] device wg2 left promiscuous mode [ 53.673430][ T936] device wg2 entered promiscuous mode [ 54.651840][ T967] device sit0 left promiscuous mode [ 54.728015][ T974] device wg2 left promiscuous mode [ 54.751575][ T975] device sit0 entered promiscuous mode [ 55.507493][ T974] device wg2 entered promiscuous mode [ 55.767518][ T28] audit: type=1400 audit(1760662369.039:120): avc: denied { read } for pid=989 comm="syz.3.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 55.784069][ T982] device syzkaller0 entered promiscuous mode [ 56.515414][ T1020] device wg2 left promiscuous mode [ 56.577952][ T1022] device wg2 entered promiscuous mode [ 57.283568][ T1043] device wg2 left promiscuous mode [ 57.316471][ T1043] device wg2 entered promiscuous mode [ 57.795661][ T1077] device wg2 left promiscuous mode [ 57.847154][ T1077] device wg2 entered promiscuous mode [ 58.122445][ T1092] device wg2 left promiscuous mode [ 58.130335][ T1092] device wg2 entered promiscuous mode [ 58.928930][ T1108] GPL: port 1(erspan0) entered blocking state [ 58.944999][ T1108] GPL: port 1(erspan0) entered disabled state [ 58.977100][ T1108] device erspan0 entered promiscuous mode [ 59.024144][ T1111] GPL: port 1(erspan0) entered blocking state [ 59.030507][ T1111] GPL: port 1(erspan0) entered forwarding state [ 59.241916][ T1120] device wg2 left promiscuous mode [ 59.361018][ T1120] device wg2 entered promiscuous mode [ 59.696914][ T1138] device wg2 left promiscuous mode [ 59.751878][ T1139] device wg2 entered promiscuous mode [ 60.063389][ T1150] device veth0_vlan left promiscuous mode [ 60.077557][ T1150] device veth0_vlan entered promiscuous mode [ 60.114423][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.150991][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.176382][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.681284][ T28] audit: type=1400 audit(1760662373.949:121): avc: denied { create } for pid=1160 comm="syz.0.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 60.772568][ T28] audit: type=1400 audit(1760662374.039:122): avc: denied { create } for pid=1169 comm="syz.4.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 60.896490][ T1182] device wg2 left promiscuous mode [ 60.916606][ T1184] bridge0: port 3(veth1_macvtap) entered blocking state [ 60.955891][ T1184] bridge0: port 3(veth1_macvtap) entered disabled state [ 61.020838][ T1182] device wg2 entered promiscuous mode [ 61.254519][ T28] audit: type=1400 audit(1760662374.519:123): avc: denied { create } for pid=1190 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 61.885430][ T1212] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.892762][ T1212] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.071738][ T1242] device veth1_macvtap left promiscuous mode [ 63.312538][ T1271] device wg2 left promiscuous mode [ 63.381600][ T1271] device wg2 entered promiscuous mode [ 65.397583][ T1312] device wg2 left promiscuous mode [ 65.527430][ T1313] device wg2 entered promiscuous mode [ 68.847068][ T1222] syz.3.247 (1222) used greatest stack depth: 22176 bytes left [ 69.740074][ T28] audit: type=1400 audit(1760662383.009:124): avc: denied { create } for pid=1413 comm="syz.4.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 73.326991][ T1503] device syzkaller0 entered promiscuous mode [ 73.637623][ T1198] syz.1.243 (1198) used greatest stack depth: 22048 bytes left [ 74.447868][ T1530] device veth0_vlan left promiscuous mode [ 74.468666][ T1530] device veth0_vlan entered promiscuous mode [ 74.494692][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 74.526911][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 74.546924][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 74.755917][ T1536] bridge0: port 3(dummy0) entered blocking state [ 74.800696][ T1536] bridge0: port 3(dummy0) entered disabled state [ 74.885975][ T1536] device dummy0 entered promiscuous mode [ 74.925900][ T1536] bridge0: port 3(dummy0) entered blocking state [ 74.932488][ T1536] bridge0: port 3(dummy0) entered forwarding state [ 76.622760][ T1607] device pim6reg1 entered promiscuous mode [ 77.416928][ T28] audit: type=1400 audit(1760662390.689:125): avc: denied { create } for pid=1625 comm="syz.0.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 77.533817][ T1632] device wg2 left promiscuous mode [ 77.542644][ T1632] device wg2 entered promiscuous mode [ 78.845338][ C1] sched: RT throttling activated [ 81.145945][ T1677] device wg2 left promiscuous mode [ 81.246747][ T1677] device wg2 entered promiscuous mode [ 81.262303][ T1678] device veth0_vlan left promiscuous mode [ 81.292473][ T1678] device veth0_vlan entered promiscuous mode [ 82.147310][ T1679] syz.1.370 (1679) used greatest stack depth: 21408 bytes left [ 82.911679][ T1710] device wg2 left promiscuous mode [ 84.164908][ T1740] device wg2 entered promiscuous mode [ 84.260796][ T1742] device pim6reg1 entered promiscuous mode [ 88.244199][ T1860] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.251472][ T1860] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.301405][ T1864] device bridge_slave_1 left promiscuous mode [ 88.308001][ T1864] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.316647][ T1864] device bridge_slave_0 left promiscuous mode [ 88.322993][ T1864] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.046377][ T28] audit: type=1400 audit(1760662402.319:126): avc: denied { write } for pid=1892 comm="syz.1.428" name="cgroup.subtree_control" dev="cgroup2" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 89.126060][ T28] audit: type=1400 audit(1760662402.339:127): avc: denied { open } for pid=1892 comm="syz.1.428" path="" dev="cgroup2" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 89.234705][ T28] audit: type=1400 audit(1760662402.339:128): avc: denied { ioctl } for pid=1892 comm="syz.1.428" path="" dev="cgroup2" ino=219 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 90.248983][ T1933] device wg2 left promiscuous mode [ 90.295536][ T1933] device wg2 entered promiscuous mode [ 90.472327][ T1932] device veth0_vlan left promiscuous mode [ 90.545283][ T1932] device veth0_vlan entered promiscuous mode [ 90.654425][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.664801][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.675981][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.212138][ T28] audit: type=1400 audit(1760662404.479:129): avc: denied { create } for pid=1978 comm="syz.2.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 93.242858][ T28] audit: type=1400 audit(1760662406.509:130): avc: denied { create } for pid=2019 comm="syz.4.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 93.577523][ T2044] device wg2 left promiscuous mode [ 93.624711][ T2044] device wg2 entered promiscuous mode [ 94.598131][ T28] audit: type=1400 audit(1760662407.869:131): avc: denied { create } for pid=2116 comm="syz.3.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 94.916475][ T2132] device bridge_slave_1 left promiscuous mode [ 94.958060][ T2132] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.988856][ T2132] device bridge_slave_0 left promiscuous mode [ 94.996030][ T2132] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.878086][ T2171] device veth0_vlan left promiscuous mode [ 95.884990][ T2171] device veth0_vlan entered promiscuous mode [ 95.908406][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.926311][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.945610][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.964508][ T2169] bond_slave_1: mtu less than device minimum [ 96.314730][ T2188] device sit0 entered promiscuous mode [ 97.076100][ T2218] device sit0 entered promiscuous mode [ 97.273679][ T2229] device wg2 left promiscuous mode [ 97.295392][ T2230] device wg2 entered promiscuous mode [ 97.414216][ T2234] device lo entered promiscuous mode [ 98.526880][ T28] audit: type=1400 audit(1760662411.799:132): avc: denied { create } for pid=2256 comm="syz.3.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 98.610000][ T28] audit: type=1400 audit(1760662411.859:133): avc: denied { create } for pid=2256 comm="syz.3.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 98.633100][ T28] audit: type=1400 audit(1760662411.859:134): avc: denied { create } for pid=2256 comm="syz.3.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 98.659782][ T28] audit: type=1400 audit(1760662411.909:135): avc: denied { create } for pid=2256 comm="syz.3.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 99.166621][ T2277] device syzkaller0 entered promiscuous mode [ 99.554003][ T102] udevd[102]: worker [1660] terminated by signal 33 (Unknown signal 33) [ 99.604355][ T102] udevd[102]: worker [1660] failed while handling '/devices/virtual/block/loop3' [ 99.880271][ T2315] syz.0.548 (2315) used obsolete PPPIOCDETACH ioctl [ 100.035456][ T2322] device pim6reg1 entered promiscuous mode [ 100.435604][ T28] audit: type=1400 audit(1760662413.709:136): avc: denied { create } for pid=2344 comm="syz.2.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 100.601180][ T2350] syz.4.559[2350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.601258][ T2350] syz.4.559[2350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.607757][ T2351] syz.4.559[2351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.854717][ T2365] syz.4.563 uses obsolete (PF_INET,SOCK_PACKET) [ 101.105764][ T2378] device wg2 left promiscuous mode [ 101.162118][ T2378] device wg2 entered promiscuous mode [ 101.717816][ T2389] device sit0 left promiscuous mode [ 101.752437][ T2373] syz.0.564 (2373) used greatest stack depth: 21024 bytes left [ 101.927906][ T2395] device wg2 left promiscuous mode [ 101.937705][ T2396] device wg2 entered promiscuous mode [ 102.287333][ T28] audit: type=1400 audit(1760662415.559:137): avc: denied { create } for pid=2416 comm="syz.4.579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 102.468536][ T2430] device wg2 left promiscuous mode [ 102.577235][ T2431] device wg2 entered promiscuous mode [ 102.744645][ T2437] device wg2 left promiscuous mode [ 102.791935][ T2437] device wg2 entered promiscuous mode [ 104.888220][ T2442] bond_slave_1: mtu less than device minimum [ 105.005116][ T2451] device veth0_vlan left promiscuous mode [ 105.013648][ T2451] device veth0_vlan entered promiscuous mode [ 105.030909][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.041409][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.050872][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.076874][ T2454] device wg2 left promiscuous mode [ 105.095135][ T2458] device wg2 left promiscuous mode [ 105.104942][ T2460] device wg2 entered promiscuous mode [ 105.129632][ T2458] device wg2 entered promiscuous mode [ 105.819451][ T2479] device sit0 left promiscuous mode [ 105.923659][ T2479] device sit0 entered promiscuous mode [ 106.193286][ T2490] device sit0 left promiscuous mode [ 106.308005][ T2493] device sit0 entered promiscuous mode [ 106.424771][ T2494] device wg2 left promiscuous mode [ 106.459996][ T2495] device wg2 entered promiscuous mode [ 107.073583][ T2524] device pim6reg1 entered promiscuous mode [ 107.635622][ T2534] device syzkaller0 entered promiscuous mode [ 109.775911][ T2618] syz.3.637[2618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.770123][ T2626] device syzkaller0 entered promiscuous mode [ 112.513723][ T2674] device pim6reg1 entered promiscuous mode [ 114.227937][ T2734] device wg2 left promiscuous mode [ 114.273867][ T2734] device wg2 entered promiscuous mode [ 114.728725][ T2755] device sit0 left promiscuous mode [ 114.766665][ T2755] device sit0 entered promiscuous mode [ 116.065187][ T2808] device pim6reg1 entered promiscuous mode [ 116.376544][ T2821] device pim6reg1 entered promiscuous mode [ 116.460795][ T2827] device pim6reg1 entered promiscuous mode [ 116.816544][ T2835] device sit0 left promiscuous mode [ 118.378251][ T2846] device wg2 left promiscuous mode [ 118.450092][ T2846] device wg2 entered promiscuous mode [ 119.526455][ T2865] device wg2 left promiscuous mode [ 121.332389][ T2952] device wg2 left promiscuous mode [ 121.405993][ T2959] FAULT_INJECTION: forcing a failure. [ 121.405993][ T2959] name failslab, interval 1, probability 0, space 0, times 1 [ 121.420100][ T2959] CPU: 0 PID: 2959 Comm: syz.2.736 Not tainted syzkaller #0 [ 121.427431][ T2959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 121.438147][ T2959] Call Trace: [ 121.441544][ T2959] [ 121.444605][ T2959] __dump_stack+0x21/0x24 [ 121.449144][ T2959] dump_stack_lvl+0xee/0x150 [ 121.454129][ T2959] ? __cfi_dump_stack_lvl+0x8/0x8 [ 121.459377][ T2959] dump_stack+0x15/0x24 [ 121.464027][ T2959] should_fail_ex+0x3d4/0x520 [ 121.468758][ T2959] __should_failslab+0xac/0xf0 [ 121.473819][ T2959] should_failslab+0x9/0x20 [ 121.478545][ T2959] slab_pre_alloc_hook+0x30/0x1e0 [ 121.483882][ T2959] kmem_cache_alloc_lru+0x49/0x280 [ 121.489132][ T2959] ? sock_alloc_inode+0x28/0xc0 [ 121.509572][ T2959] sock_alloc_inode+0x28/0xc0 [ 121.514292][ T2959] ? __cfi_sock_alloc_inode+0x10/0x10 [ 121.519900][ T2959] new_inode_pseudo+0x70/0x1f0 [ 121.524690][ T2959] __sock_create+0x12c/0x7c0 [ 121.529516][ T2959] sock_create_kern+0x3b/0x50 [ 121.534308][ T2959] udp_sock_create4+0xbb/0x4b0 [ 121.539089][ T2959] ? __cfi_udp_sock_create4+0x10/0x10 [ 121.544556][ T2959] ? __this_cpu_preempt_check+0x13/0x20 [ 121.550558][ T2959] wg_socket_init+0x2ce/0x7f0 [ 121.555696][ T2959] ? __cfi_wg_socket_init+0x10/0x10 [ 121.560946][ T2959] ? __kasan_check_write+0x14/0x20 [ 121.566439][ T2959] ? __cfi_wg_receive+0x10/0x10 [ 121.571572][ T2959] ? __kasan_check_write+0x14/0x20 [ 121.576710][ T2959] ? vlan_device_event+0x49e/0x1ba0 [ 121.582326][ T2959] ? __cfi_mutex_lock+0x10/0x10 [ 121.587211][ T2959] ? udp_tunnel_nic_netdevice_event+0x1b4/0x1390 [ 121.593872][ T2959] ? ndisc_netdev_event+0x8e/0x620 [ 121.599351][ T2959] wg_open+0x18a/0x300 [ 121.603694][ T2959] __dev_open+0x363/0x4f0 [ 121.608039][ T2959] ? dev_open+0x230/0x230 [ 121.612571][ T2959] ? _raw_spin_unlock_bh+0x50/0x60 [ 121.617700][ T2959] ? dev_set_rx_mode+0x223/0x2c0 [ 121.622650][ T2959] ? __kasan_check_read+0x11/0x20 [ 121.627698][ T2959] __dev_change_flags+0x21b/0x6b0 [ 121.632853][ T2959] ? __cfi___dev_change_flags+0x10/0x10 [ 121.638500][ T2959] dev_change_flags+0x88/0x1a0 [ 121.643477][ T2959] dev_ifsioc+0x159/0xed0 [ 121.647929][ T2959] ? dev_ioctl+0xd10/0xd10 [ 121.652451][ T2959] ? __mutex_lock_slowpath+0xe/0x10 [ 121.657663][ T2959] ? mutex_lock+0xf8/0x1a0 [ 121.662400][ T2959] ? __cfi_mutex_lock+0x10/0x10 [ 121.667362][ T2959] ? dev_get_by_name_rcu+0xe5/0x130 [ 121.673182][ T2959] dev_ioctl+0x556/0xd10 [ 121.677541][ T2959] sock_do_ioctl+0x23f/0x310 [ 121.682504][ T2959] ? sock_show_fdinfo+0xb0/0xb0 [ 121.687464][ T2959] ? selinux_file_ioctl+0x377/0x480 [ 121.693026][ T2959] sock_ioctl+0x4d8/0x6e0 [ 121.697556][ T2959] ? __cfi_sock_ioctl+0x10/0x10 [ 121.702608][ T2959] ? __fget_files+0x2d5/0x330 [ 121.707793][ T2959] ? security_file_ioctl+0x95/0xc0 [ 121.713550][ T2959] ? __cfi_sock_ioctl+0x10/0x10 [ 121.718618][ T2959] __se_sys_ioctl+0x12f/0x1b0 [ 121.723418][ T2959] __x64_sys_ioctl+0x7b/0x90 [ 121.728190][ T2959] x64_sys_call+0x58b/0x9a0 [ 121.732879][ T2959] do_syscall_64+0x4c/0xa0 [ 121.737664][ T2959] ? clear_bhb_loop+0x30/0x80 [ 121.743131][ T2959] ? clear_bhb_loop+0x30/0x80 [ 121.748170][ T2959] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 121.754458][ T2959] RIP: 0033:0x7f18f0f8eec9 [ 121.759129][ T2959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.779485][ T2959] RSP: 002b:00007f18f1e98038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 121.789169][ T2959] RAX: ffffffffffffffda RBX: 00007f18f11e6090 RCX: 00007f18f0f8eec9 [ 121.797421][ T2959] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000b [ 121.805608][ T2959] RBP: 00007f18f1e98090 R08: 0000000000000000 R09: 0000000000000000 [ 121.813961][ T2959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.822016][ T2959] R13: 00007f18f11e6128 R14: 00007f18f11e6090 R15: 00007ffc3570c058 [ 121.830199][ T2959] [ 121.843102][ T2959] socket: no more sockets [ 121.852483][ T2959] wireguard: wg2: Could not create IPv4 socket [ 121.869354][ T2959] device wg2 entered promiscuous mode [ 123.323282][ T28] audit: type=1400 audit(1760662436.589:138): avc: denied { create } for pid=2995 comm="syz.3.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 123.715810][ T3009] device wg2 left promiscuous mode [ 123.738159][ T3009] device wg2 entered promiscuous mode [ 124.579324][ T3048] device wg2 left promiscuous mode [ 124.685719][ T3048] FAULT_INJECTION: forcing a failure. [ 124.685719][ T3048] name failslab, interval 1, probability 0, space 0, times 0 [ 124.755828][ T3048] CPU: 0 PID: 3048 Comm: syz.3.767 Not tainted syzkaller #0 [ 124.763279][ T3048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 124.773624][ T3048] Call Trace: [ 124.777134][ T3048] [ 124.780107][ T3048] __dump_stack+0x21/0x24 [ 124.784642][ T3048] dump_stack_lvl+0xee/0x150 [ 124.789357][ T3048] ? __cfi_dump_stack_lvl+0x8/0x8 [ 124.794585][ T3048] dump_stack+0x15/0x24 [ 124.798878][ T3048] should_fail_ex+0x3d4/0x520 [ 124.803768][ T3048] ? sk_prot_alloc+0x5f/0x320 [ 124.808559][ T3048] __should_failslab+0xac/0xf0 [ 124.813358][ T3048] should_failslab+0x9/0x20 [ 124.818189][ T3048] kmem_cache_alloc+0x3b/0x330 [ 124.823011][ T3048] ? slab_post_alloc_hook+0x6d/0x2d0 [ 124.828375][ T3048] ? security_inode_alloc+0x33/0x120 [ 124.833890][ T3048] sk_prot_alloc+0x5f/0x320 [ 124.838531][ T3048] sk_alloc+0x3b/0x460 [ 124.842733][ T3048] ? __cfi__raw_spin_lock+0x10/0x10 [ 124.847980][ T3048] inet_create+0x5dd/0xf70 [ 124.852625][ T3048] __sock_create+0x39e/0x7c0 [ 124.857843][ T3048] sock_create_kern+0x3b/0x50 [ 124.862843][ T3048] udp_sock_create4+0xbb/0x4b0 [ 124.867736][ T3048] ? __cfi_udp_sock_create4+0x10/0x10 [ 124.873754][ T3048] ? __cfi_bpf_strtol+0x10/0x10 [ 124.878785][ T3048] ? __cfi_sched_clock_cpu+0x10/0x10 [ 124.884464][ T3048] wg_socket_init+0x2ce/0x7f0 [ 124.889180][ T3048] ? __cfi_wg_socket_init+0x10/0x10 [ 124.894848][ T3048] ? __kasan_check_write+0x14/0x20 [ 124.900078][ T3048] ? __cfi_wg_receive+0x10/0x10 [ 124.905020][ T3048] ? __kasan_check_write+0x14/0x20 [ 124.910322][ T3048] ? vlan_device_event+0x49e/0x1ba0 [ 124.915757][ T3048] ? __cfi_mutex_lock+0x10/0x10 [ 124.921011][ T3048] ? udp_tunnel_nic_netdevice_event+0x1b4/0x1390 [ 124.927499][ T3048] ? ndisc_netdev_event+0x8e/0x620 [ 124.932653][ T3048] wg_open+0x18a/0x300 [ 124.936876][ T3048] __dev_open+0x363/0x4f0 [ 124.941510][ T3048] ? dev_open+0x230/0x230 [ 124.946325][ T3048] ? _raw_spin_unlock_bh+0x50/0x60 [ 124.951739][ T3048] ? dev_set_rx_mode+0x223/0x2c0 [ 124.956918][ T3048] ? __kasan_check_read+0x11/0x20 [ 124.962156][ T3048] __dev_change_flags+0x21b/0x6b0 [ 124.967505][ T3048] ? __cfi___dev_change_flags+0x10/0x10 [ 124.973379][ T3048] dev_change_flags+0x88/0x1a0 [ 124.978272][ T3048] dev_ifsioc+0x159/0xed0 [ 124.983352][ T3048] ? dev_ioctl+0xd10/0xd10 [ 124.987906][ T3048] ? __mutex_lock_slowpath+0xe/0x10 [ 124.993146][ T3048] ? mutex_lock+0xf8/0x1a0 [ 124.997599][ T3048] ? __cfi_mutex_lock+0x10/0x10 [ 125.002581][ T3048] ? dev_get_by_name_rcu+0xe5/0x130 [ 125.007920][ T3048] dev_ioctl+0x556/0xd10 [ 125.012293][ T3048] sock_do_ioctl+0x23f/0x310 [ 125.017012][ T3048] ? sock_show_fdinfo+0xb0/0xb0 [ 125.022113][ T3048] ? selinux_file_ioctl+0x377/0x480 [ 125.027437][ T3048] sock_ioctl+0x4d8/0x6e0 [ 125.031992][ T3048] ? __cfi_sock_ioctl+0x10/0x10 [ 125.036985][ T3048] ? __fget_files+0x2d5/0x330 [ 125.041871][ T3048] ? security_file_ioctl+0x95/0xc0 [ 125.047107][ T3048] ? __cfi_sock_ioctl+0x10/0x10 [ 125.052258][ T3048] __se_sys_ioctl+0x12f/0x1b0 [ 125.057171][ T3048] __x64_sys_ioctl+0x7b/0x90 [ 125.061895][ T3048] x64_sys_call+0x58b/0x9a0 [ 125.066876][ T3048] do_syscall_64+0x4c/0xa0 [ 125.071344][ T3048] ? clear_bhb_loop+0x30/0x80 [ 125.076154][ T3048] ? clear_bhb_loop+0x30/0x80 [ 125.080901][ T3048] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 125.086971][ T3048] RIP: 0033:0x7f0e2838eec9 [ 125.091608][ T3048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 125.112406][ T3048] RSP: 002b:00007f0e29224038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 125.121048][ T3048] RAX: ffffffffffffffda RBX: 00007f0e285e5fa0 RCX: 00007f0e2838eec9 [ 125.129234][ T3048] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000b [ 125.137509][ T3048] RBP: 00007f0e29224090 R08: 0000000000000000 R09: 0000000000000000 [ 125.146055][ T3048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 125.155813][ T3048] R13: 00007f0e285e6038 R14: 00007f0e285e5fa0 R15: 00007ffdda95f1d8 [ 125.165027][ T3048] [ 125.285511][ T3048] wireguard: wg2: Could not create IPv4 socket [ 125.294173][ T3048] device wg2 entered promiscuous mode [ 125.326548][ T3050] device sit0 entered promiscuous mode [ 125.625061][ T3058] device sit0 left promiscuous mode [ 125.700403][ T3058] device sit0 entered promiscuous mode [ 125.912387][ T3087] device wg2 left promiscuous mode [ 125.953142][ T3087] device wg2 entered promiscuous mode [ 126.045501][ T3091] device wg2 entered promiscuous mode [ 126.474037][ T3118] device pim6reg1 entered promiscuous mode [ 127.426314][ T3173] FAULT_INJECTION: forcing a failure. [ 127.426314][ T3173] name failslab, interval 1, probability 0, space 0, times 0 [ 127.564415][ T3173] CPU: 1 PID: 3173 Comm: syz.1.809 Not tainted syzkaller #0 [ 127.572566][ T3173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 127.583202][ T3173] Call Trace: [ 127.586782][ T3173] [ 127.589784][ T3173] __dump_stack+0x21/0x24 [ 127.594173][ T3173] dump_stack_lvl+0xee/0x150 [ 127.598974][ T3173] ? __cfi_dump_stack_lvl+0x8/0x8 [ 127.604400][ T3173] ? stack_trace_save+0x98/0xe0 [ 127.609392][ T3173] dump_stack+0x15/0x24 [ 127.613641][ T3173] should_fail_ex+0x3d4/0x520 [ 127.618746][ T3173] __should_failslab+0xac/0xf0 [ 127.623728][ T3173] ? __get_vm_area_node+0x12c/0x360 [ 127.629402][ T3173] should_failslab+0x9/0x20 [ 127.634236][ T3173] __kmem_cache_alloc_node+0x3d/0x2c0 [ 127.639912][ T3173] ? __x64_sys_clone+0x168/0x1b0 [ 127.645078][ T3173] ? x64_sys_call+0x990/0x9a0 [ 127.650172][ T3173] ? do_syscall_64+0x4c/0xa0 [ 127.655202][ T3173] ? __get_vm_area_node+0x12c/0x360 [ 127.660531][ T3173] kmalloc_node_trace+0x26/0xb0 [ 127.665699][ T3173] __get_vm_area_node+0x12c/0x360 [ 127.671034][ T3173] __vmalloc_node_range+0x326/0x13d0 [ 127.677071][ T3173] ? copy_process+0x5b8/0x3480 [ 127.681985][ T3173] ? kasan_save_alloc_info+0x25/0x30 [ 127.688035][ T3173] ? __cfi___vmalloc_node_range+0x10/0x10 [ 127.694151][ T3173] ? memcpy+0x56/0x70 [ 127.698265][ T3173] dup_task_struct+0x3ae/0x790 [ 127.703262][ T3173] ? copy_process+0x5b8/0x3480 [ 127.708156][ T3173] ? __kasan_check_write+0x14/0x20 [ 127.713663][ T3173] ? recalc_sigpending+0x168/0x1c0 [ 127.719173][ T3173] copy_process+0x5b8/0x3480 [ 127.724511][ T3173] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 127.730465][ T3173] ? __kasan_check_write+0x14/0x20 [ 127.735616][ T3173] ? idle_dummy+0x10/0x10 [ 127.740016][ T3173] kernel_clone+0x23a/0x810 [ 127.744797][ T3173] ? __cfi_kernel_clone+0x10/0x10 [ 127.749960][ T3173] ? __kasan_check_write+0x14/0x20 [ 127.755200][ T3173] ? mutex_unlock+0x89/0x220 [ 127.760029][ T3173] __x64_sys_clone+0x168/0x1b0 [ 127.765016][ T3173] ? __cfi___x64_sys_clone+0x10/0x10 [ 127.770568][ T3173] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 127.777846][ T3173] x64_sys_call+0x990/0x9a0 [ 127.782748][ T3173] do_syscall_64+0x4c/0xa0 [ 127.787484][ T3173] ? clear_bhb_loop+0x30/0x80 [ 127.792558][ T3173] ? clear_bhb_loop+0x30/0x80 [ 127.797487][ T3173] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 127.803611][ T3173] RIP: 0033:0x7f6c2698eec9 [ 127.808173][ T3173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.828167][ T3173] RSP: 002b:00007f6c253f6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 127.836594][ T3173] RAX: ffffffffffffffda RBX: 00007f6c26be5fa0 RCX: 00007f6c2698eec9 [ 127.844748][ T3173] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040100000 [ 127.852831][ T3173] RBP: 00007f6c253f7090 R08: 0000000000000000 R09: 0000000000000000 [ 127.860820][ T3173] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 127.869075][ T3173] R13: 00007f6c26be6038 R14: 00007f6c26be5fa0 R15: 00007ffcd8052598 [ 127.877449][ T3173] [ 128.219016][ T3173] syz.1.809: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 128.266049][ T3173] CPU: 0 PID: 3173 Comm: syz.1.809 Not tainted syzkaller #0 [ 128.273600][ T3173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 128.284050][ T3173] Call Trace: [ 128.287745][ T3173] [ 128.290707][ T3173] __dump_stack+0x21/0x24 [ 128.295155][ T3173] dump_stack_lvl+0xee/0x150 [ 128.299888][ T3173] ? __cfi_dump_stack_lvl+0x8/0x8 [ 128.305664][ T3173] ? pr_cont_kernfs_name+0x133/0x160 [ 128.311268][ T3173] dump_stack+0x15/0x24 [ 128.315574][ T3173] warn_alloc+0x1b0/0x1d0 [ 128.319960][ T3173] ? should_failslab+0x9/0x20 [ 128.324951][ T3173] ? __cfi_warn_alloc+0x10/0x10 [ 128.330925][ T3173] ? kmalloc_node_trace+0x3d/0xb0 [ 128.336805][ T3173] ? __get_vm_area_node+0x353/0x360 [ 128.342209][ T3173] __vmalloc_node_range+0x34b/0x13d0 [ 128.347617][ T3173] ? kasan_save_alloc_info+0x25/0x30 [ 128.353808][ T3173] ? __cfi___vmalloc_node_range+0x10/0x10 [ 128.359835][ T3173] ? memcpy+0x56/0x70 [ 128.364116][ T3173] dup_task_struct+0x3ae/0x790 [ 128.369263][ T3173] ? copy_process+0x5b8/0x3480 [ 128.374324][ T3173] ? __kasan_check_write+0x14/0x20 [ 128.379768][ T3173] ? recalc_sigpending+0x168/0x1c0 [ 128.385903][ T3173] copy_process+0x5b8/0x3480 [ 128.391362][ T3173] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 128.397836][ T3173] ? __kasan_check_write+0x14/0x20 [ 128.403318][ T3173] ? idle_dummy+0x10/0x10 [ 128.409166][ T3173] kernel_clone+0x23a/0x810 [ 128.413962][ T3173] ? __cfi_kernel_clone+0x10/0x10 [ 128.419948][ T3173] ? __kasan_check_write+0x14/0x20 [ 128.425541][ T3173] ? mutex_unlock+0x89/0x220 [ 128.431039][ T3173] __x64_sys_clone+0x168/0x1b0 [ 128.437288][ T3173] ? __cfi___x64_sys_clone+0x10/0x10 [ 128.443337][ T3173] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 128.450147][ T3173] x64_sys_call+0x990/0x9a0 [ 128.454811][ T3173] do_syscall_64+0x4c/0xa0 [ 128.459253][ T3173] ? clear_bhb_loop+0x30/0x80 [ 128.464246][ T3173] ? clear_bhb_loop+0x30/0x80 [ 128.470704][ T3173] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 128.477888][ T3173] RIP: 0033:0x7f6c2698eec9 [ 128.482431][ T3173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.504076][ T3173] RSP: 002b:00007f6c253f6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 128.512956][ T3173] RAX: ffffffffffffffda RBX: 00007f6c26be5fa0 RCX: 00007f6c2698eec9 [ 128.521846][ T3173] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040100000 [ 128.529853][ T3173] RBP: 00007f6c253f7090 R08: 0000000000000000 R09: 0000000000000000 [ 128.538196][ T3173] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 128.546276][ T3173] R13: 00007f6c26be6038 R14: 00007f6c26be5fa0 R15: 00007ffcd8052598 [ 128.554664][ T3173] [ 128.843724][ T3192] device wg2 left promiscuous mode [ 128.859275][ T3192] FAULT_INJECTION: forcing a failure. [ 128.859275][ T3192] name failslab, interval 1, probability 0, space 0, times 0 [ 128.884398][ T3173] Mem-Info: [ 128.900395][ T3173] active_anon:23439 inactive_anon:0 isolated_anon:0 [ 128.900395][ T3173] active_file:26108 inactive_file:2268 isolated_file:0 [ 128.900395][ T3173] unevictable:0 dirty:150 writeback:0 [ 128.900395][ T3173] slab_reclaimable:7753 slab_unreclaimable:74217 [ 128.900395][ T3173] mapped:38994 shmem:18378 pagetables:714 [ 128.900395][ T3173] sec_pagetables:0 bounce:0 [ 128.900395][ T3173] kernel_misc_reclaimable:0 [ 128.900395][ T3173] free:1505800 free_pcp:4277 free_cma:0 [ 128.959402][ T3173] Node 0 active_anon:100156kB inactive_anon:0kB active_file:104432kB inactive_file:9072kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:162276kB dirty:600kB writeback:0kB shmem:79912kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5392kB pagetables:2856kB sec_pagetables:0kB all_unreclaimable? no [ 128.977169][ T3192] CPU: 0 PID: 3192 Comm: syz.3.816 Not tainted syzkaller #0 [ 128.997710][ T3173] DMA32 free:2968532kB boost:0kB min:31288kB low:39108kB high:46928kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2974192kB mlocked:0kB bounce:0kB free_pcp:5660kB local_pcp:5600kB free_cma:0kB [ 129.005007][ T3192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 129.005024][ T3192] Call Trace: [ 129.005031][ T3192] [ 129.005039][ T3192] __dump_stack+0x21/0x24 [ 129.058633][ T3192] dump_stack_lvl+0xee/0x150 [ 129.063357][ T3192] ? __cfi_dump_stack_lvl+0x8/0x8 [ 129.068908][ T3192] ? __local_bh_enable_ip+0x58/0x80 [ 129.074225][ T3192] ? _raw_spin_unlock_bh+0x50/0x60 [ 129.079665][ T3192] ? release_sock+0x169/0x1c0 [ 129.084655][ T3192] dump_stack+0x15/0x24 [ 129.088837][ T3192] should_fail_ex+0x3d4/0x520 [ 129.093890][ T3192] __should_failslab+0xac/0xf0 [ 129.098851][ T3192] should_failslab+0x9/0x20 [ 129.103734][ T3192] slab_pre_alloc_hook+0x30/0x1e0 [ 129.109156][ T3192] kmem_cache_alloc_lru+0x49/0x280 [ 129.114666][ T3192] ? sock_alloc_inode+0x28/0xc0 [ 129.119723][ T3192] sock_alloc_inode+0x28/0xc0 [ 129.124416][ T3192] ? __cfi_sock_alloc_inode+0x10/0x10 [ 129.130258][ T3192] new_inode_pseudo+0x70/0x1f0 [ 129.135054][ T3192] __sock_create+0x12c/0x7c0 [ 129.139779][ T3192] sock_create_kern+0x3b/0x50 [ 129.144555][ T3192] udp_sock_create6+0xc8/0x630 [ 129.149427][ T3192] ? __cfi_static_key_slow_inc_cpuslocked+0x10/0x10 [ 129.157470][ T3192] ? static_key_slow_inc_cpuslocked+0x138/0x300 [ 129.163944][ T3192] ? __cfi_udp_sock_create6+0x10/0x10 [ 129.170511][ T3192] ? cpus_read_unlock+0x76/0xb0 [ 129.175670][ T3192] ? static_key_slow_inc+0x1f/0x30 [ 129.181169][ T3192] ? setup_udp_tunnel_sock+0x3af/0x490 [ 129.187782][ T3192] wg_socket_init+0x405/0x7f0 [ 129.193061][ T3192] ? __cfi_wg_socket_init+0x10/0x10 [ 129.198544][ T3192] ? __kasan_check_write+0x14/0x20 [ 129.203854][ T3192] ? __cfi_wg_receive+0x10/0x10 [ 129.209072][ T3192] ? __kasan_check_write+0x14/0x20 [ 129.214640][ T3192] ? vlan_device_event+0x49e/0x1ba0 [ 129.219999][ T3192] ? __cfi_mutex_lock+0x10/0x10 [ 129.224987][ T3192] ? udp_tunnel_nic_netdevice_event+0x1b4/0x1390 [ 129.232318][ T3192] ? ndisc_netdev_event+0x8e/0x620 [ 129.237623][ T3192] wg_open+0x18a/0x300 [ 129.242250][ T3192] __dev_open+0x363/0x4f0 [ 129.246779][ T3192] ? dev_open+0x230/0x230 [ 129.251622][ T3192] ? _raw_spin_unlock_bh+0x50/0x60 [ 129.256765][ T3192] ? dev_set_rx_mode+0x223/0x2c0 [ 129.262001][ T3192] ? __kasan_check_read+0x11/0x20 [ 129.267347][ T3192] __dev_change_flags+0x21b/0x6b0 [ 129.272584][ T3192] ? __cfi___dev_change_flags+0x10/0x10 [ 129.278730][ T3192] dev_change_flags+0x88/0x1a0 [ 129.283967][ T3192] dev_ifsioc+0x159/0xed0 [ 129.288581][ T3192] ? dev_ioctl+0xd10/0xd10 [ 129.293108][ T3192] ? __kasan_check_write+0x14/0x20 [ 129.298344][ T3192] ? mutex_lock+0x8d/0x1a0 [ 129.303170][ T3192] ? __cfi_mutex_lock+0x10/0x10 [ 129.308624][ T3192] ? dev_get_by_name_rcu+0xe5/0x130 [ 129.314200][ T3192] dev_ioctl+0x556/0xd10 [ 129.318908][ T3192] sock_do_ioctl+0x23f/0x310 [ 129.323799][ T3192] ? sock_show_fdinfo+0xb0/0xb0 [ 129.328847][ T3192] ? selinux_file_ioctl+0x377/0x480 [ 129.334458][ T3192] sock_ioctl+0x4d8/0x6e0 [ 129.338887][ T3192] ? __cfi_sock_ioctl+0x10/0x10 [ 129.343784][ T3192] ? __fget_files+0x2d5/0x330 [ 129.348698][ T3192] ? security_file_ioctl+0x95/0xc0 [ 129.354169][ T3192] ? __cfi_sock_ioctl+0x10/0x10 [ 129.359464][ T3192] __se_sys_ioctl+0x12f/0x1b0 [ 129.364156][ T3192] __x64_sys_ioctl+0x7b/0x90 [ 129.368870][ T3192] x64_sys_call+0x58b/0x9a0 [ 129.373747][ T3192] do_syscall_64+0x4c/0xa0 [ 129.378361][ T3192] ? clear_bhb_loop+0x30/0x80 [ 129.383242][ T3192] ? clear_bhb_loop+0x30/0x80 [ 129.388218][ T3192] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 129.394150][ T3192] RIP: 0033:0x7f0e2838eec9 [ 129.399056][ T3192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 129.419736][ T3192] RSP: 002b:00007f0e29224038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 129.428341][ T3192] RAX: ffffffffffffffda RBX: 00007f0e285e5fa0 RCX: 00007f0e2838eec9 [ 129.436892][ T3192] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000b [ 129.444958][ T3192] RBP: 00007f0e29224090 R08: 0000000000000000 R09: 0000000000000000 [ 129.453503][ T3192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 129.461900][ T3192] R13: 00007f0e285e6038 R14: 00007f0e285e5fa0 R15: 00007ffdda95f1d8 [ 129.470705][ T3192] [ 129.486020][ T3192] socket: no more sockets [ 129.491153][ T3192] wireguard: wg2: Could not create IPv6 socket [ 129.499135][ T3192] device wg2 entered promiscuous mode [ 129.550366][ T3173] lowmem_reserve[]: 0 3932 3932 3932 [ 129.556301][ T3173] Normal free:3038540kB boost:0kB min:42436kB low:53044kB high:63652kB reserved_highatomic:0KB active_anon:110088kB inactive_anon:0kB active_file:104432kB inactive_file:9072kB unevictable:0kB writepending:692kB present:5242880kB managed:4026656kB mlocked:0kB bounce:0kB free_pcp:11440kB local_pcp:2924kB free_cma:0kB [ 129.615406][ T3173] lowmem_reserve[]: 0 0 0 0 [ 129.630617][ T3173] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2968532kB [ 129.677049][ T3173] Normal: 421*4kB (UE) 791*8kB (UME) 404*16kB (UME) 855*32kB (UE) 495*64kB (UME) 341*128kB (UME) 168*256kB (UME) 78*512kB (UME) 32*1024kB (UME) 9*2048kB (UME) 676*4096kB (UM) = 3020204kB [ 129.755280][ T3173] 57001 total pagecache pages [ 129.778691][ T3173] 0 pages in swap cache [ 129.793888][ T3173] Free swap = 124996kB [ 129.805459][ T3173] Total swap = 124996kB [ 129.809680][ T3173] 2097051 pages RAM [ 129.813508][ T3173] 0 pages HighMem/MovableOnly [ 129.838756][ T3173] 346839 pages reserved [ 129.842969][ T3173] 0 pages cma reserved [ 131.783763][ T28] audit: type=1400 audit(1760662445.049:139): avc: denied { create } for pid=3281 comm="syz.0.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 133.215534][ T3321] device macsec0 left promiscuous mode [ 133.541509][ T3327] device wg2 left promiscuous mode [ 133.613800][ T3327] device wg2 entered promiscuous mode [ 134.257948][ T3347] device sit0 left promiscuous mode [ 136.542444][ T3379] FAULT_INJECTION: forcing a failure. [ 136.542444][ T3379] name failslab, interval 1, probability 0, space 0, times 0 [ 136.568589][ T3379] CPU: 0 PID: 3379 Comm: syz.2.865 Not tainted syzkaller #0 [ 136.576494][ T3379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 136.586593][ T3379] Call Trace: [ 136.590090][ T3379] [ 136.593046][ T3379] __dump_stack+0x21/0x24 [ 136.597675][ T3379] dump_stack_lvl+0xee/0x150 [ 136.602394][ T3379] ? __cfi_dump_stack_lvl+0x8/0x8 [ 136.607631][ T3379] ? memset+0x35/0x40 [ 136.611829][ T3379] dump_stack+0x15/0x24 [ 136.616108][ T3379] should_fail_ex+0x3d4/0x520 [ 136.621178][ T3379] __should_failslab+0xac/0xf0 [ 136.626484][ T3379] should_failslab+0x9/0x20 [ 136.631631][ T3379] slab_pre_alloc_hook+0x30/0x1e0 [ 136.636979][ T3379] kmem_cache_alloc_lru+0x49/0x280 [ 136.642378][ T3379] ? __d_alloc+0x34/0x6c0 [ 136.646948][ T3379] __d_alloc+0x34/0x6c0 [ 136.651220][ T3379] ? rwsem_write_trylock+0x130/0x300 [ 136.656896][ T3379] d_alloc+0x4b/0x1d0 [ 136.660998][ T3379] lookup_one_qstr_excl+0xcb/0x270 [ 136.666259][ T3379] filename_create+0x219/0x450 [ 136.671573][ T3379] ? check_stack_object+0x81/0x140 [ 136.677493][ T3379] ? kern_path_create+0x1b0/0x1b0 [ 136.682637][ T3379] do_mkdirat+0x5c/0x4c0 [ 136.686960][ T3379] ? getname_flags+0x206/0x500 [ 136.692620][ T3379] __x64_sys_mkdir+0x6e/0x80 [ 136.697235][ T3379] x64_sys_call+0x966/0x9a0 [ 136.701760][ T3379] do_syscall_64+0x4c/0xa0 [ 136.706221][ T3379] ? clear_bhb_loop+0x30/0x80 [ 136.710931][ T3379] ? clear_bhb_loop+0x30/0x80 [ 136.715914][ T3379] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 136.721831][ T3379] RIP: 0033:0x7f18f0f8eec9 [ 136.726256][ T3379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.746242][ T3379] RSP: 002b:00007f18f1eb9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 136.754855][ T3379] RAX: ffffffffffffffda RBX: 00007f18f11e5fa0 RCX: 00007f18f0f8eec9 [ 136.763134][ T3379] RDX: 0000000000000000 RSI: be9bac6d2d0f4e0b RDI: 0000200000000000 [ 136.771218][ T3379] RBP: 00007f18f1eb9090 R08: 0000000000000000 R09: 0000000000000000 [ 136.779484][ T3379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 136.787564][ T3379] R13: 00007f18f11e6038 R14: 00007f18f11e5fa0 R15: 00007ffc3570c058 [ 136.795928][ T3379] [ 136.821107][ T3381] device pim6reg1 entered promiscuous mode [ 139.039536][ T3403] device syzkaller0 entered promiscuous mode [ 139.162468][ T3424] device pim6reg1 entered promiscuous mode [ 139.726347][ T3431] device pim6reg1 entered promiscuous mode [ 140.480620][ T3459] device sit0 left promiscuous mode [ 140.542133][ T3465] device pim6reg1 entered promiscuous mode [ 140.999991][ T3492] device sit0 entered promiscuous mode [ 141.583668][ T3499] device wg2 left promiscuous mode [ 141.688346][ T3499] device wg2 entered promiscuous mode [ 143.104977][ T3547] device wg2 left promiscuous mode [ 143.278405][ T3551] device wg2 entered promiscuous mode [ 143.286440][ T3549] bond_slave_1: mtu less than device minimum [ 143.391443][ T28] audit: type=1400 audit(1760662456.659:140): avc: denied { create } for pid=3556 comm="syz.4.917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 144.050804][ T3587] device veth0_vlan left promiscuous mode [ 144.177016][ T3587] device veth0_vlan entered promiscuous mode [ 144.344168][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.355600][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.384297][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.468474][ T3603] device wg2 left promiscuous mode [ 145.525734][ T3654] device wg2 entered promiscuous mode [ 146.977089][ T3701] device wg2 left promiscuous mode [ 148.152397][ T3720] device syzkaller0 entered promiscuous mode [ 148.204267][ T3721] device sit0 left promiscuous mode [ 148.264768][ T3722] device sit0 entered promiscuous mode [ 149.800638][ T3773] device wg2 entered promiscuous mode [ 149.876623][ T3773] device pim6reg1 entered promiscuous mode [ 150.444674][ T3788] device veth0_vlan left promiscuous mode [ 150.543950][ T3788] device veth0_vlan entered promiscuous mode [ 150.649540][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.666810][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.716340][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.075418][ T3835] device wg2 left promiscuous mode [ 152.117306][ T3835] device wg2 entered promiscuous mode [ 152.771449][ T3864] device pim6reg1 entered promiscuous mode [ 153.106373][ T3867] device syzkaller0 entered promiscuous mode [ 153.141005][ T3868] device sit0 left promiscuous mode [ 153.217702][ T3871] device sit0 entered promiscuous mode [ 153.374710][ T3873] device wg2 left promiscuous mode [ 153.386472][ T3877] device wg2 entered promiscuous mode [ 153.505518][ T3880] device pim6reg1 entered promiscuous mode [ 153.758307][ T3890] device pim6reg1 entered promiscuous mode [ 153.869168][ T3899] device wg2 left promiscuous mode [ 153.955726][ T3899] device wg2 entered promiscuous mode [ 154.045401][ T3906] device pim6reg1 entered promiscuous mode [ 154.291754][ T3919] device wg2 left promiscuous mode [ 154.384180][ T3919] device wg2 entered promiscuous mode [ 154.810541][ T3925] device syzkaller0 entered promiscuous mode [ 154.846457][ T3935] device sit0 left promiscuous mode [ 154.866580][ T3938] device sit0 entered promiscuous mode [ 155.172349][ T3957] device wg2 left promiscuous mode [ 155.235985][ T3964] device wg2 entered promiscuous mode [ 155.318813][ T3973] device wg2 left promiscuous mode [ 155.955568][ T3992] device sit0 left promiscuous mode [ 155.981131][ T3992] device sit0 entered promiscuous mode [ 156.025843][ T3998] device wg2 left promiscuous mode [ 156.044222][ T3998] device wg2 entered promiscuous mode [ 156.409852][ T4021] GPL: port 1(erspan0) entered blocking state [ 156.452365][ T4021] GPL: port 1(erspan0) entered disabled state [ 156.480734][ T4021] device erspan0 entered promiscuous mode [ 156.520382][ T4022] GPL: port 1(erspan0) entered blocking state [ 156.526811][ T4022] GPL: port 1(erspan0) entered forwarding state [ 157.633018][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 157.690365][ T4063] device pim6reg1 entered promiscuous mode [ 157.926511][ T4070] device wg2 entered promiscuous mode [ 158.224396][ T4081] device pim6reg1 entered promiscuous mode [ 158.278346][ T4083] caif0: tun_chr_ioctl cmd 35092 [ 158.342135][ T4086] device wg2 left promiscuous mode [ 158.812217][ T4118] device wg2 left promiscuous mode [ 160.826564][ T4177] device wg2 entered promiscuous mode [ 162.003215][ T4211] device wg2 left promiscuous mode [ 162.119982][ T4211] device wg2 entered promiscuous mode [ 162.269046][ T4227] bond_slave_1: mtu less than device minimum [ 162.643334][ T4239] device wg2 left promiscuous mode [ 162.789511][ T4239] device wg2 entered promiscuous mode [ 163.225554][ T4252] device wg2 left promiscuous mode [ 163.244269][ T4256] device wg2 entered promiscuous mode [ 163.605445][ T4264] device veth0_vlan left promiscuous mode [ 163.615996][ T4264] device veth0_vlan entered promiscuous mode [ 163.689012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.698414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.707551][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.916444][ T10] device bridge_slave_1 left promiscuous mode [ 165.924922][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.946405][ T10] device bridge_slave_0 left promiscuous mode [ 165.953720][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.180031][ T4301] device pim6reg1 entered promiscuous mode [ 166.519417][ T4303] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.545125][ T4303] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.585875][ T4303] device bridge_slave_0 entered promiscuous mode [ 166.619796][ T4303] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.627121][ T4303] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.634914][ T4303] device bridge_slave_1 entered promiscuous mode [ 166.675724][ T4304] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.689446][ T4304] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.729780][ T4304] device bridge_slave_0 entered promiscuous mode [ 166.787601][ T4304] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.810979][ T4304] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.843732][ T4304] device bridge_slave_1 entered promiscuous mode [ 167.363618][ T28] audit: type=1400 audit(1760662480.629:141): avc: denied { create } for pid=4303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 167.392800][ T28] audit: type=1400 audit(1760662480.659:142): avc: denied { write } for pid=4303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 167.415016][ T28] audit: type=1400 audit(1760662480.659:143): avc: denied { read } for pid=4303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 167.451034][ T4335] device pim6reg1 entered promiscuous mode [ 167.510331][ T28] audit: type=1400 audit(1760662480.779:144): avc: denied { create } for pid=4344 comm="syz.2.1155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 167.539638][ T10] device veth0_vlan left promiscuous mode [ 167.647353][ T4357] bond_slave_1: mtu less than device minimum [ 167.667720][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.679880][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.702853][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.714468][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.754360][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.777220][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.786188][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.793362][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.802663][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.821749][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.831312][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.838505][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.846640][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.889783][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.899290][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.908332][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.915691][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.956019][ T4372] device syzkaller0 entered promiscuous mode [ 167.965376][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.974110][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.982945][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.994157][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.004585][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.013402][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.022293][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.041895][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.049284][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.106243][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 168.119789][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 168.129027][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.137913][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.147147][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.155756][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.190468][ T4304] device veth0_vlan entered promiscuous mode [ 168.199912][ T4381] device pim6reg1 entered promiscuous mode [ 168.207359][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 168.230129][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 168.239180][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 168.247534][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.259317][ T4303] device veth0_vlan entered promiscuous mode [ 168.274475][ T4304] device veth1_macvtap entered promiscuous mode [ 168.291869][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.300768][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.310462][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 168.318781][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.327684][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 168.336378][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 168.344927][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 168.397771][ T4303] device veth1_macvtap entered promiscuous mode [ 168.407299][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.415024][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.427315][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 168.486398][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 168.512101][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 168.521189][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 168.530036][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 168.539005][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 168.548053][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 168.605646][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 168.635565][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 168.649062][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 168.658476][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 168.794662][ T4393] @0Ù: renamed from bond_slave_1 [ 169.181510][ T4423] device syzkaller0 entered promiscuous mode [ 169.636293][ T4435] device wg2 left promiscuous mode [ 169.664315][ T4437] device wg2 entered promiscuous mode [ 169.821388][ T28] audit: type=1400 audit(1760662483.089:145): avc: denied { create } for pid=4438 comm="syz.4.1183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 171.831127][ T4540] device syzkaller0 entered promiscuous mode [ 171.961245][ T4548] Ÿë: port 1(syz_tun) entered blocking state [ 171.967703][ T4548] Ÿë: port 1(syz_tun) entered disabled state [ 171.974592][ T4548] device syz_tun entered promiscuous mode [ 171.987030][ T4550] device sit0 entered promiscuous mode [ 172.259369][ T4551] Ÿë: port 1(syz_tun) entered blocking state [ 172.265594][ T4551] Ÿë: port 1(syz_tun) entered forwarding state [ 172.278654][ T4548] device veth0_vlan left promiscuous mode [ 172.286794][ T4548] device veth0_vlan entered promiscuous mode [ 172.294465][ T4561] device sit0 left promiscuous mode [ 172.309284][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.319890][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.328137][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.703728][ T4581] device wg2 left promiscuous mode [ 172.936468][ T4598] device veth1_macvtap left promiscuous mode [ 173.589054][ T4625] device veth1_macvtap entered promiscuous mode [ 173.624483][ T4625] device macsec0 entered promiscuous mode [ 173.743768][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 174.564924][ T4657] device wg2 left promiscuous mode [ 174.884194][ T4659] device wg2 entered promiscuous mode [ 175.820309][ T4679] syz.2.1250[4679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.820425][ T4679] syz.2.1250[4679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.962716][ T4683] device sit0 left promiscuous mode [ 176.099574][ T4682] device sit0 entered promiscuous mode [ 178.200662][ T4754] device syzkaller0 entered promiscuous mode [ 178.556748][ T4771] bond_slave_1: mtu less than device minimum [ 179.055865][ T4781] device sit0 left promiscuous mode [ 179.288819][ T4783] device sit0 entered promiscuous mode [ 179.538554][ T4792] device syzkaller0 entered promiscuous mode [ 179.948729][ T4818] device sit0 left promiscuous mode [ 180.811667][ T28] audit: type=1400 audit(1760662494.079:146): avc: denied { create } for pid=4844 comm="syz.0.1299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 181.195147][ T4868] device veth1_macvtap left promiscuous mode [ 181.234323][ T4869] device veth1_macvtap entered promiscuous mode [ 181.243073][ T4869] device macsec0 entered promiscuous mode [ 181.330322][ T28] audit: type=1400 audit(1760662494.599:147): avc: denied { create } for pid=4864 comm="syz.8.1303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 182.306904][ T4892] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.315007][ T4892] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.440982][ T4896] device bridge_slave_1 left promiscuous mode [ 182.458572][ T4896] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.478108][ T4896] device bridge_slave_0 left promiscuous mode [ 182.495760][ T4896] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.830022][ T28] audit: type=1400 audit(1760662496.099:148): avc: denied { read } for pid=4918 comm="syz.8.1319" dev="nsfs" ino=4026532289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 182.914212][ T28] audit: type=1400 audit(1760662496.099:149): avc: denied { open } for pid=4918 comm="syz.8.1319" path="pid:[4026532289]" dev="nsfs" ino=4026532289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 185.900248][ T5025] device syzkaller0 entered promiscuous mode [ 187.302764][ T5073] device veth1_macvtap left promiscuous mode [ 187.437094][ T5071] device veth1_macvtap entered promiscuous mode [ 187.491628][ T5071] device macsec0 entered promiscuous mode [ 187.552216][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 188.022463][ T28] audit: type=1400 audit(1760662501.289:150): avc: denied { ioctl } for pid=5095 comm="syz.8.1370" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 188.273136][ T5113] bond_slave_1: mtu less than device minimum [ 188.305834][ T5112] bond_slave_1: mtu less than device minimum [ 189.193693][ T28] audit: type=1400 audit(1760662502.459:151): avc: denied { create } for pid=5142 comm="syz.8.1382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 189.754351][ T5172] device wg2 entered promiscuous mode [ 190.040706][ T5183] device pim6reg1 entered promiscuous mode [ 190.295247][ T5201] bond_slave_1: mtu less than device minimum [ 193.353520][ T5314] device sit0 entered promiscuous mode [ 194.156678][ T5330] device wg2 entered promiscuous mode [ 196.229878][ T5414] device sit0 entered promiscuous mode [ 197.664423][ T5455] device pim6reg1 entered promiscuous mode [ 198.707904][ T5483] device sit0 left promiscuous mode [ 200.010974][ T5519] device sit0 entered promiscuous mode [ 200.273002][ T5528] device veth1_macvtap left promiscuous mode [ 200.319320][ T5526] device sit0 left promiscuous mode [ 200.511873][ T5530] device veth1_macvtap entered promiscuous mode [ 200.518795][ T5530] device macsec0 entered promiscuous mode [ 201.215372][ T5557] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.222906][ T5557] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.288621][ T5584] syz.9.1517[5584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.288717][ T5584] syz.9.1517[5584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.378136][ T5584] device wg2 entered promiscuous mode [ 204.101707][ T5637] device pim6reg1 entered promiscuous mode [ 204.497211][ T5656] FAULT_INJECTION: forcing a failure. [ 204.497211][ T5656] name failslab, interval 1, probability 0, space 0, times 0 [ 204.571240][ T5656] CPU: 0 PID: 5656 Comm: syz.8.1536 Not tainted syzkaller #0 [ 204.578776][ T5656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 204.589349][ T5656] Call Trace: [ 204.592680][ T5656] [ 204.595723][ T5656] __dump_stack+0x21/0x24 [ 204.600298][ T5656] dump_stack_lvl+0xee/0x150 [ 204.605705][ T5656] ? __cfi_dump_stack_lvl+0x8/0x8 [ 204.611118][ T5656] ? __alloc_pages+0x439/0x450 [ 204.615941][ T5656] ? __cfi___alloc_pages+0x10/0x10 [ 204.621107][ T5656] dump_stack+0x15/0x24 [ 204.625322][ T5656] should_fail_ex+0x3d4/0x520 [ 204.630233][ T5656] __should_failslab+0xac/0xf0 [ 204.635076][ T5656] ? slhc_init+0x160/0x770 [ 204.639623][ T5656] should_failslab+0x9/0x20 [ 204.644248][ T5656] __kmem_cache_alloc_node+0x3d/0x2c0 [ 204.649779][ T5656] ? slhc_init+0x160/0x770 [ 204.654241][ T5656] __kmalloc+0xa1/0x1e0 [ 204.658534][ T5656] slhc_init+0x160/0x770 [ 204.662837][ T5656] ppp_ioctl+0x126d/0x1690 [ 204.667392][ T5656] ? mutex_unlock+0x89/0x220 [ 204.672350][ T5656] ? __cfi_mutex_unlock+0x10/0x10 [ 204.677592][ T5656] ? __cfi_ppp_ioctl+0x10/0x10 [ 204.682575][ T5656] ? __fget_files+0x2d5/0x330 [ 204.687558][ T5656] ? security_file_ioctl+0x95/0xc0 [ 204.692976][ T5656] ? __cfi_ppp_ioctl+0x10/0x10 [ 204.697879][ T5656] __se_sys_ioctl+0x12f/0x1b0 [ 204.702611][ T5656] __x64_sys_ioctl+0x7b/0x90 [ 204.707233][ T5656] x64_sys_call+0x58b/0x9a0 [ 204.711960][ T5656] do_syscall_64+0x4c/0xa0 [ 204.716546][ T5656] ? clear_bhb_loop+0x30/0x80 [ 204.721469][ T5656] ? clear_bhb_loop+0x30/0x80 [ 204.726282][ T5656] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 204.732491][ T5656] RIP: 0033:0x7fb2c118eec9 [ 204.737029][ T5656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.757282][ T5656] RSP: 002b:00007fb2c201a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 204.765907][ T5656] RAX: ffffffffffffffda RBX: 00007fb2c13e5fa0 RCX: 00007fb2c118eec9 [ 204.773900][ T5656] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000003 [ 204.781896][ T5656] RBP: 00007fb2c201a090 R08: 0000000000000000 R09: 0000000000000000 [ 204.790064][ T5656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 204.798660][ T5656] R13: 00007fb2c13e6038 R14: 00007fb2c13e5fa0 R15: 00007fff2e5dd478 [ 204.807194][ T5656] [ 208.399549][ T5763] device sit0 entered promiscuous mode [ 208.447001][ T5756] device sit0 entered promiscuous mode [ 209.853287][ T5818] device syzkaller0 entered promiscuous mode [ 210.184327][ T5836] device sit0 left promiscuous mode [ 210.296872][ T5846] device sit0 entered promiscuous mode [ 211.589880][ T5884] device sit0 left promiscuous mode [ 211.614517][ T5884] device sit0 entered promiscuous mode [ 213.523935][ T5947] device sit0 left promiscuous mode [ 214.423037][ T5983] GPL: port 1(erspan0) entered blocking state [ 214.468347][ T5983] GPL: port 1(erspan0) entered disabled state [ 214.529302][ T5983] device erspan0 entered promiscuous mode [ 214.616441][ T5986] GPL: port 1(erspan0) entered blocking state [ 214.623167][ T5986] GPL: port 1(erspan0) entered forwarding state [ 214.862545][ T5990] device syzkaller0 entered promiscuous mode [ 214.898045][ T5995] device sit0 left promiscuous mode [ 216.069853][ T6032] device sit0 entered promiscuous mode [ 220.945851][ T6176] device sit0 left promiscuous mode [ 221.983936][ T6222] device wg2 left promiscuous mode [ 222.848314][ T6267] device sit0 entered promiscuous mode [ 224.295947][ T6317] device sit0 left promiscuous mode [ 225.048258][ T6350] device veth0_vlan left promiscuous mode [ 225.066570][ T6350] device veth0_vlan entered promiscuous mode [ 225.121061][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 225.166179][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 225.229519][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 225.937780][ T6377] device syzkaller0 entered promiscuous mode [ 228.436203][ T6435] device syzkaller0 entered promiscuous mode [ 228.661831][ T6449] device sit0 left promiscuous mode [ 229.464589][ T6488] device syzkaller0 entered promiscuous mode [ 230.576369][ T6539] device sit0 entered promiscuous mode [ 232.406658][ T6562] device sit0 left promiscuous mode [ 232.469077][ T6568] device sit0 entered promiscuous mode [ 234.108371][ T6621] FAULT_INJECTION: forcing a failure. [ 234.108371][ T6621] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 234.172330][ T6621] CPU: 1 PID: 6621 Comm: syz.2.1827 Not tainted syzkaller #0 [ 234.180037][ T6621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 234.190391][ T6621] Call Trace: [ 234.194137][ T6621] [ 234.197205][ T6621] __dump_stack+0x21/0x24 [ 234.202034][ T6621] dump_stack_lvl+0xee/0x150 [ 234.206995][ T6621] ? __cfi_dump_stack_lvl+0x8/0x8 [ 234.212256][ T6621] dump_stack+0x15/0x24 [ 234.216713][ T6621] should_fail_ex+0x3d4/0x520 [ 234.221623][ T6621] should_fail+0xb/0x10 [ 234.225929][ T6621] should_fail_usercopy+0x1a/0x20 [ 234.231263][ T6621] _copy_from_user+0x1e/0xc0 [ 234.236174][ T6621] __sys_bpf+0x277/0x780 [ 234.241698][ T6621] ? bpf_link_show_fdinfo+0x320/0x320 [ 234.247415][ T6621] ? __cfi_ksys_write+0x10/0x10 [ 234.253043][ T6621] ? debug_smp_processor_id+0x17/0x20 [ 234.258919][ T6621] __x64_sys_bpf+0x7c/0x90 [ 234.264191][ T6621] x64_sys_call+0x488/0x9a0 [ 234.269512][ T6621] do_syscall_64+0x4c/0xa0 [ 234.274131][ T6621] ? clear_bhb_loop+0x30/0x80 [ 234.279034][ T6621] ? clear_bhb_loop+0x30/0x80 [ 234.283850][ T6621] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 234.289986][ T6621] RIP: 0033:0x7f18f0f8eec9 [ 234.294475][ T6621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 234.315124][ T6621] RSP: 002b:00007f18f1eb9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 234.323671][ T6621] RAX: ffffffffffffffda RBX: 00007f18f11e5fa0 RCX: 00007f18f0f8eec9 [ 234.331937][ T6621] RDX: 0000000000000020 RSI: 0000200000000140 RDI: 0000000000000012 [ 234.340029][ T6621] RBP: 00007f18f1eb9090 R08: 0000000000000000 R09: 0000000000000000 [ 234.348145][ T6621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 234.356844][ T6621] R13: 00007f18f11e6038 R14: 00007f18f11e5fa0 R15: 00007ffc3570c058 [ 234.365051][ T6621] [ 234.662350][ T6636] device sit0 entered promiscuous mode [ 235.178673][ T6649] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 235.352654][ T6649] device syzkaller0 entered promiscuous mode [ 236.086467][ T6693] bond_slave_1: mtu less than device minimum [ 237.603291][ T6760] device pim6reg1 entered promiscuous mode [ 237.712304][ T28] audit: type=1400 audit(1760662550.979:152): avc: denied { create } for pid=6764 comm="syz.9.1870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 238.797088][ T6790] device sit0 left promiscuous mode [ 238.905942][ T6798] device sit0 entered promiscuous mode [ 241.483758][ T6868] bridge0: port 3(veth0) entered blocking state [ 241.505375][ T6868] bridge0: port 3(veth0) entered disabled state [ 241.512998][ T6868] device veth0 entered promiscuous mode [ 244.350279][ T6929] FAULT_INJECTION: forcing a failure. [ 244.350279][ T6929] name failslab, interval 1, probability 0, space 0, times 0 [ 244.365409][ T6929] CPU: 1 PID: 6929 Comm: syz.4.1915 Not tainted syzkaller #0 [ 244.373362][ T6929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 244.383827][ T6929] Call Trace: [ 244.387129][ T6929] [ 244.390085][ T6929] __dump_stack+0x21/0x24 [ 244.394549][ T6929] dump_stack_lvl+0xee/0x150 [ 244.399164][ T6929] ? __cfi_dump_stack_lvl+0x8/0x8 [ 244.404376][ T6929] dump_stack+0x15/0x24 [ 244.408574][ T6929] should_fail_ex+0x3d4/0x520 [ 244.413355][ T6929] __should_failslab+0xac/0xf0 [ 244.418163][ T6929] ? slhc_init+0x77/0x770 [ 244.422502][ T6929] should_failslab+0x9/0x20 [ 244.427362][ T6929] __kmem_cache_alloc_node+0x3d/0x2c0 [ 244.433193][ T6929] ? slhc_init+0x77/0x770 [ 244.437645][ T6929] kmalloc_trace+0x29/0xb0 [ 244.443038][ T6929] slhc_init+0x77/0x770 [ 244.447232][ T6929] ppp_ioctl+0x126d/0x1690 [ 244.451929][ T6929] ? __cfi_ppp_ioctl+0x10/0x10 [ 244.456880][ T6929] ? __fget_files+0x2d5/0x330 [ 244.461674][ T6929] ? security_file_ioctl+0x95/0xc0 [ 244.466796][ T6929] ? __cfi_ppp_ioctl+0x10/0x10 [ 244.471584][ T6929] __se_sys_ioctl+0x12f/0x1b0 [ 244.476375][ T6929] __x64_sys_ioctl+0x7b/0x90 [ 244.480993][ T6929] x64_sys_call+0x58b/0x9a0 [ 244.485767][ T6929] do_syscall_64+0x4c/0xa0 [ 244.490189][ T6929] ? clear_bhb_loop+0x30/0x80 [ 244.495084][ T6929] ? clear_bhb_loop+0x30/0x80 [ 244.499966][ T6929] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 244.505983][ T6929] RIP: 0033:0x7f162478eec9 [ 244.510422][ T6929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 244.530479][ T6929] RSP: 002b:00007f16255a6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 244.538915][ T6929] RAX: ffffffffffffffda RBX: 00007f16249e5fa0 RCX: 00007f162478eec9 [ 244.546956][ T6929] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000047 [ 244.555301][ T6929] RBP: 00007f16255a6090 R08: 0000000000000000 R09: 0000000000000000 [ 244.563491][ T6929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 244.571655][ T6929] R13: 00007f16249e6038 R14: 00007f16249e5fa0 R15: 00007fff5be0b338 [ 244.579727][ T6929] [ 244.893888][ T6945] device sit0 entered promiscuous mode [ 245.095489][ T6959] bond_slave_1: mtu less than device minimum [ 246.542475][ T6981] FAULT_INJECTION: forcing a failure. [ 246.542475][ T6981] name failslab, interval 1, probability 0, space 0, times 0 [ 246.561765][ T6981] CPU: 1 PID: 6981 Comm: syz.4.1931 Not tainted syzkaller #0 [ 246.569376][ T6981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 246.579728][ T6981] Call Trace: [ 246.583044][ T6981] [ 246.586094][ T6981] __dump_stack+0x21/0x24 [ 246.590471][ T6981] dump_stack_lvl+0xee/0x150 [ 246.595359][ T6981] ? __cfi_dump_stack_lvl+0x8/0x8 [ 246.600781][ T6981] dump_stack+0x15/0x24 [ 246.605234][ T6981] should_fail_ex+0x3d4/0x520 [ 246.610046][ T6981] __should_failslab+0xac/0xf0 [ 246.615107][ T6981] ? slhc_init+0xb0/0x770 [ 246.619876][ T6981] should_failslab+0x9/0x20 [ 246.624421][ T6981] __kmem_cache_alloc_node+0x3d/0x2c0 [ 246.630017][ T6981] ? slhc_init+0xb0/0x770 [ 246.634386][ T6981] __kmalloc+0xa1/0x1e0 [ 246.638773][ T6981] slhc_init+0xb0/0x770 [ 246.643309][ T6981] ppp_ioctl+0x126d/0x1690 [ 246.648117][ T6981] ? irqentry_exit+0x37/0x40 [ 246.652839][ T6981] ? __cfi_ppp_ioctl+0x10/0x10 [ 246.657736][ T6981] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 246.663579][ T6981] ? security_file_ioctl+0x95/0xc0 [ 246.669302][ T6981] ? __cfi_ppp_ioctl+0x10/0x10 [ 246.674581][ T6981] __se_sys_ioctl+0x12f/0x1b0 [ 246.680114][ T6981] __x64_sys_ioctl+0x7b/0x90 [ 246.685367][ T6981] x64_sys_call+0x58b/0x9a0 [ 246.690368][ T6981] do_syscall_64+0x4c/0xa0 [ 246.694948][ T6981] ? clear_bhb_loop+0x30/0x80 [ 246.699934][ T6981] ? clear_bhb_loop+0x30/0x80 [ 246.704844][ T6981] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 246.711309][ T6981] RIP: 0033:0x7f162478eec9 [ 246.715978][ T6981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 246.736490][ T6981] RSP: 002b:00007f16255a6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 246.745209][ T6981] RAX: ffffffffffffffda RBX: 00007f16249e5fa0 RCX: 00007f162478eec9 [ 246.753318][ T6981] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000047 [ 246.761501][ T6981] RBP: 00007f16255a6090 R08: 0000000000000000 R09: 0000000000000000 [ 246.769579][ T6981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 246.777644][ T6981] R13: 00007f16249e6038 R14: 00007f16249e5fa0 R15: 00007fff5be0b338 [ 246.785635][ T6981] [ 247.794458][ T7012] device sit0 left promiscuous mode [ 248.135648][ T7029] FAULT_INJECTION: forcing a failure. [ 248.135648][ T7029] name failslab, interval 1, probability 0, space 0, times 0 [ 248.281561][ T7029] CPU: 0 PID: 7029 Comm: syz.2.1942 Not tainted syzkaller #0 [ 248.289279][ T7029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 248.299366][ T7029] Call Trace: [ 248.302671][ T7029] [ 248.305633][ T7029] __dump_stack+0x21/0x24 [ 248.310166][ T7029] dump_stack_lvl+0xee/0x150 [ 248.315154][ T7029] ? __cfi_dump_stack_lvl+0x8/0x8 [ 248.320761][ T7029] ? kasan_set_track+0x60/0x70 [ 248.325833][ T7029] ? kasan_save_free_info+0x31/0x50 [ 248.331174][ T7029] ? ____kasan_slab_free+0x132/0x180 [ 248.336884][ T7029] ? __kasan_slab_free+0x11/0x20 [ 248.341954][ T7029] ? __kmem_cache_free+0xb7/0x1b0 [ 248.347026][ T7029] dump_stack+0x15/0x24 [ 248.351489][ T7029] should_fail_ex+0x3d4/0x520 [ 248.356299][ T7029] __should_failslab+0xac/0xf0 [ 248.361796][ T7029] should_failslab+0x9/0x20 [ 248.366784][ T7029] slab_pre_alloc_hook+0x30/0x1e0 [ 248.372298][ T7029] kmem_cache_alloc_lru+0x49/0x280 [ 248.378427][ T7029] ? __d_alloc+0x34/0x6c0 [ 248.382809][ T7029] __d_alloc+0x34/0x6c0 [ 248.387006][ T7029] ? __kasan_check_write+0x14/0x20 [ 248.392195][ T7029] ? _raw_spin_lock+0x8e/0xe0 [ 248.397187][ T7029] d_alloc_pseudo+0x1d/0x70 [ 248.402347][ T7029] alloc_file_pseudo+0xc8/0x1f0 [ 248.407412][ T7029] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 248.413886][ T7029] ? alloc_fd+0x4e6/0x590 [ 248.418384][ T7029] anon_inode_getfd+0xd6/0x1d0 [ 248.423504][ T7029] btf_new_fd+0x62e/0x7d0 [ 248.428155][ T7029] bpf_btf_load+0x6f/0x90 [ 248.432610][ T7029] __sys_bpf+0x556/0x780 [ 248.436984][ T7029] ? bpf_link_show_fdinfo+0x320/0x320 [ 248.442869][ T7029] ? __cfi_ksys_write+0x10/0x10 [ 248.447845][ T7029] ? debug_smp_processor_id+0x17/0x20 [ 248.453449][ T7029] __x64_sys_bpf+0x7c/0x90 [ 248.458073][ T7029] x64_sys_call+0x488/0x9a0 [ 248.462592][ T7029] do_syscall_64+0x4c/0xa0 [ 248.467116][ T7029] ? clear_bhb_loop+0x30/0x80 [ 248.472103][ T7029] ? clear_bhb_loop+0x30/0x80 [ 248.476894][ T7029] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 248.482796][ T7029] RIP: 0033:0x7f18f0f8eec9 [ 248.487214][ T7029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.507262][ T7029] RSP: 002b:00007f18f1eb9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 248.515900][ T7029] RAX: ffffffffffffffda RBX: 00007f18f11e5fa0 RCX: 00007f18f0f8eec9 [ 248.523993][ T7029] RDX: 0000000000000020 RSI: 0000200000000140 RDI: 0000000000000012 [ 248.532238][ T7029] RBP: 00007f18f1eb9090 R08: 0000000000000000 R09: 0000000000000000 [ 248.540319][ T7029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 248.548471][ T7029] R13: 00007f18f11e6038 R14: 00007f18f11e5fa0 R15: 00007ffc3570c058 [ 248.556472][ T7029] [ 249.071673][ T7044] FAULT_INJECTION: forcing a failure. [ 249.071673][ T7044] name failslab, interval 1, probability 0, space 0, times 0 [ 249.157885][ T7044] CPU: 1 PID: 7044 Comm: syz.0.1945 Not tainted syzkaller #0 [ 249.165587][ T7044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 249.175849][ T7044] Call Trace: [ 249.179442][ T7044] [ 249.182860][ T7044] __dump_stack+0x21/0x24 [ 249.187452][ T7044] dump_stack_lvl+0xee/0x150 [ 249.192094][ T7044] ? __cfi_dump_stack_lvl+0x8/0x8 [ 249.197254][ T7044] dump_stack+0x15/0x24 [ 249.201717][ T7044] should_fail_ex+0x3d4/0x520 [ 249.206543][ T7044] __should_failslab+0xac/0xf0 [ 249.211436][ T7044] ? slhc_init+0x160/0x770 [ 249.215894][ T7044] should_failslab+0x9/0x20 [ 249.220432][ T7044] __kmem_cache_alloc_node+0x3d/0x2c0 [ 249.226111][ T7044] ? kasan_save_alloc_info+0x25/0x30 [ 249.231548][ T7044] ? slhc_init+0x160/0x770 [ 249.236447][ T7044] __kmalloc+0xa1/0x1e0 [ 249.241005][ T7044] slhc_init+0x160/0x770 [ 249.245390][ T7044] ppp_ioctl+0x126d/0x1690 [ 249.249954][ T7044] ? mutex_unlock+0x89/0x220 [ 249.254673][ T7044] ? __cfi_mutex_unlock+0x10/0x10 [ 249.259754][ T7044] ? __cfi_ppp_ioctl+0x10/0x10 [ 249.264641][ T7044] ? __fget_files+0x2d5/0x330 [ 249.269455][ T7044] ? security_file_ioctl+0x95/0xc0 [ 249.274696][ T7044] ? __cfi_ppp_ioctl+0x10/0x10 [ 249.279690][ T7044] __se_sys_ioctl+0x12f/0x1b0 [ 249.284684][ T7044] __x64_sys_ioctl+0x7b/0x90 [ 249.289323][ T7044] x64_sys_call+0x58b/0x9a0 [ 249.294146][ T7044] do_syscall_64+0x4c/0xa0 [ 249.298691][ T7044] ? clear_bhb_loop+0x30/0x80 [ 249.303438][ T7044] ? clear_bhb_loop+0x30/0x80 [ 249.308237][ T7044] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 249.314253][ T7044] RIP: 0033:0x7f651358eec9 [ 249.318742][ T7044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 249.338901][ T7044] RSP: 002b:00007f65143ad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 249.347349][ T7044] RAX: ffffffffffffffda RBX: 00007f65137e6090 RCX: 00007f651358eec9 [ 249.355436][ T7044] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000047 [ 249.363558][ T7044] RBP: 00007f65143ad090 R08: 0000000000000000 R09: 0000000000000000 [ 249.371834][ T7044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 249.390084][ T7044] R13: 00007f65137e6128 R14: 00007f65137e6090 R15: 00007ffe8a6367b8 [ 249.398363][ T7044] [ 249.440294][ T28] audit: type=1400 audit(1760662562.709:153): avc: denied { create } for pid=7048 comm="syz.9.1946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 249.727585][ T7064] device wg2 left promiscuous mode [ 249.828449][ T7064] device wg2 entered promiscuous mode [ 250.343463][ T7078] syz.9.1955[7078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.344087][ T7078] syz.9.1955[7078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.798808][ T7102] device veth1_macvtap left promiscuous mode [ 250.899340][ T7102] device macsec0 left promiscuous mode [ 251.970845][ T7118] device pim6reg1 entered promiscuous mode [ 252.447627][ T7131] device veth0_vlan left promiscuous mode [ 252.454117][ T7131] device veth0_vlan entered promiscuous mode [ 252.486447][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.495082][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.504204][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.616642][ T7222] device pim6reg1 entered promiscuous mode [ 256.834707][ T7282] device pim6reg1 entered promiscuous mode [ 257.050865][ T7295] device bridge0 entered promiscuous mode [ 257.118037][ T7301] device wg2 left promiscuous mode [ 257.154060][ T7295] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 257.268196][ T7295] device syzkaller0 entered promiscuous mode [ 258.797101][ T7356] device veth1_macvtap left promiscuous mode [ 258.804009][ T7356] device macsec0 left promiscuous mode [ 258.992229][ T7359] device veth1_macvtap entered promiscuous mode [ 259.005861][ T7359] device macsec0 entered promiscuous mode [ 261.399968][ T7459] device sit0 left promiscuous mode [ 261.989918][ T7467] GPL: port 1(erspan0) entered disabled state [ 268.404082][ T7570] device pim6reg1 entered promiscuous mode [ 268.433892][ T7572] device wg2 entered promiscuous mode [ 269.074777][ T7609] device sit0 entered promiscuous mode [ 269.763979][ T7645] device veth1_macvtap left promiscuous mode [ 269.795360][ T7645] device macsec0 left promiscuous mode [ 271.674912][ T7686] device sit0 left promiscuous mode [ 271.725640][ T7678] syz.4.2134[7678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.727040][ T7678] syz.4.2134[7678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.645110][ T7727] device veth0_vlan left promiscuous mode [ 272.746682][ T7727] device veth0_vlan entered promiscuous mode [ 272.789439][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.799887][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.807976][ T762] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.286996][ T7758] device veth0_vlan left promiscuous mode [ 273.306190][ T7758] device veth0_vlan entered promiscuous mode [ 273.461853][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.489973][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.546075][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.168238][ T7776] device syzkaller0 entered promiscuous mode [ 274.726820][ T7800] device wg2 entered promiscuous mode [ 275.894145][ T7839] device pim6reg1 entered promiscuous mode [ 278.177318][ T7891] FAULT_INJECTION: forcing a failure. [ 278.177318][ T7891] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 278.203373][ T7891] CPU: 1 PID: 7891 Comm: syz.2.2200 Not tainted syzkaller #0 [ 278.211003][ T7891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 278.221539][ T7891] Call Trace: [ 278.224857][ T7891] [ 278.227803][ T7891] __dump_stack+0x21/0x24 [ 278.232239][ T7891] dump_stack_lvl+0xee/0x150 [ 278.236936][ T7891] ? __cfi_dump_stack_lvl+0x8/0x8 [ 278.242245][ T7891] dump_stack+0x15/0x24 [ 278.246630][ T7891] should_fail_ex+0x3d4/0x520 [ 278.251746][ T7891] should_fail_alloc_page+0x61/0x90 [ 278.257616][ T7891] prepare_alloc_pages+0x148/0x5f0 [ 278.262867][ T7891] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 278.268170][ T7891] ? slab_post_alloc_hook+0x4f/0x2d0 [ 278.273560][ T7891] ? alloc_vmap_area+0x17b/0x1870 [ 278.279033][ T7891] ? __get_vm_area_node+0x160/0x360 [ 278.284324][ T7891] ? __vmalloc_node_range+0x326/0x13d0 [ 278.289933][ T7891] __alloc_pages+0x124/0x450 [ 278.294600][ T7891] ? __cfi___alloc_pages+0x10/0x10 [ 278.299858][ T7891] ? __kasan_check_write+0x14/0x20 [ 278.305517][ T7891] ? _raw_spin_lock+0x8e/0xe0 [ 278.310311][ T7891] ? __cfi__raw_spin_lock+0x10/0x10 [ 278.315579][ T7891] __get_free_pages+0xe/0x30 [ 278.320186][ T7891] kasan_populate_vmalloc_pte+0x29/0x120 [ 278.325918][ T7891] __apply_to_page_range+0x8de/0xc80 [ 278.331242][ T7891] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 278.337493][ T7891] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 278.343844][ T7891] apply_to_page_range+0x3b/0x50 [ 278.348993][ T7891] kasan_populate_vmalloc+0x60/0x70 [ 278.354405][ T7891] alloc_vmap_area+0x173e/0x1870 [ 278.360356][ T7891] ? vm_map_ram+0x930/0x930 [ 278.364983][ T7891] ? __kasan_kmalloc+0x95/0xb0 [ 278.369936][ T7891] ? kmalloc_node_trace+0x3d/0xb0 [ 278.375156][ T7891] __get_vm_area_node+0x160/0x360 [ 278.380339][ T7891] __vmalloc_node_range+0x326/0x13d0 [ 278.385657][ T7891] ? array_map_alloc+0x27c/0x6d0 [ 278.390960][ T7891] ? prog_array_map_alloc+0x51/0x1b0 [ 278.396791][ T7891] ? map_create+0x49c/0xd80 [ 278.402127][ T7891] ? __sys_bpf+0x30b/0x780 [ 278.406909][ T7891] ? __x64_sys_bpf+0x7c/0x90 [ 278.411758][ T7891] ? do_syscall_64+0x4c/0xa0 [ 278.416601][ T7891] ? __cfi_selinux_capable+0x10/0x10 [ 278.422024][ T7891] ? __cfi___vmalloc_node_range+0x10/0x10 [ 278.427950][ T7891] ? cap_capable+0x1aa/0x230 [ 278.432919][ T7891] ? security_capable+0x99/0xc0 [ 278.438170][ T7891] bpf_map_area_alloc+0xd7/0xe0 [ 278.443318][ T7891] ? array_map_alloc+0x27c/0x6d0 [ 278.448503][ T7891] array_map_alloc+0x27c/0x6d0 [ 278.453547][ T7891] ? memset+0x35/0x40 [ 278.457556][ T7891] prog_array_map_alloc+0x12d/0x1b0 [ 278.462946][ T7891] map_create+0x49c/0xd80 [ 278.467587][ T7891] __sys_bpf+0x30b/0x780 [ 278.471927][ T7891] ? bpf_link_show_fdinfo+0x320/0x320 [ 278.477496][ T7891] ? __cfi_ksys_write+0x10/0x10 [ 278.482640][ T7891] ? debug_smp_processor_id+0x17/0x20 [ 278.488133][ T7891] __x64_sys_bpf+0x7c/0x90 [ 278.492563][ T7891] x64_sys_call+0x488/0x9a0 [ 278.497166][ T7891] do_syscall_64+0x4c/0xa0 [ 278.502196][ T7891] ? clear_bhb_loop+0x30/0x80 [ 278.507064][ T7891] ? clear_bhb_loop+0x30/0x80 [ 278.512018][ T7891] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 278.518391][ T7891] RIP: 0033:0x7f18f0f8eec9 [ 278.523261][ T7891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.543415][ T7891] RSP: 002b:00007f18f1eb9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 278.552487][ T7891] RAX: ffffffffffffffda RBX: 00007f18f11e5fa0 RCX: 00007f18f0f8eec9 [ 278.560777][ T7891] RDX: 0000000000000048 RSI: 00002000000027c0 RDI: 0000000000000000 [ 278.569056][ T7891] RBP: 00007f18f1eb9090 R08: 0000000000000000 R09: 0000000000000000 [ 278.577059][ T7891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.585249][ T7891] R13: 00007f18f11e6038 R14: 00007f18f11e5fa0 R15: 00007ffc3570c058 [ 278.593417][ T7891] [ 278.660607][ T7893] device sit0 left promiscuous mode [ 279.083950][ T7904] device sit0 entered promiscuous mode [ 280.372492][ T7941] syz.8.2215[7941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.372604][ T7941] syz.8.2215[7941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.727696][ T7959] device sit0 entered promiscuous mode [ 282.169457][ T7973] device pim6reg1 entered promiscuous mode [ 283.403820][ T7993] FAULT_INJECTION: forcing a failure. [ 283.403820][ T7993] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 283.449910][ T7993] CPU: 0 PID: 7993 Comm: syz.8.2233 Not tainted syzkaller #0 [ 283.457573][ T7993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 283.467668][ T7993] Call Trace: [ 283.471063][ T7993] [ 283.474012][ T7993] __dump_stack+0x21/0x24 [ 283.478466][ T7993] dump_stack_lvl+0xee/0x150 [ 283.483087][ T7993] ? __cfi_dump_stack_lvl+0x8/0x8 [ 283.488573][ T7993] dump_stack+0x15/0x24 [ 283.492751][ T7993] should_fail_ex+0x3d4/0x520 [ 283.497458][ T7993] should_fail_alloc_page+0x61/0x90 [ 283.502782][ T7993] prepare_alloc_pages+0x148/0x5f0 [ 283.508115][ T7993] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 283.513432][ T7993] ? slab_post_alloc_hook+0x4f/0x2d0 [ 283.518917][ T7993] ? alloc_vmap_area+0x17b/0x1870 [ 283.524046][ T7993] ? __get_vm_area_node+0x160/0x360 [ 283.529373][ T7993] ? __vmalloc_node_range+0x326/0x13d0 [ 283.534869][ T7993] __alloc_pages+0x124/0x450 [ 283.539524][ T7993] ? __cfi___alloc_pages+0x10/0x10 [ 283.544749][ T7993] ? __kasan_check_write+0x14/0x20 [ 283.549964][ T7993] ? _raw_spin_lock+0x8e/0xe0 [ 283.554658][ T7993] ? __cfi__raw_spin_lock+0x10/0x10 [ 283.559878][ T7993] __get_free_pages+0xe/0x30 [ 283.564502][ T7993] kasan_populate_vmalloc_pte+0x29/0x120 [ 283.570260][ T7993] __apply_to_page_range+0x8de/0xc80 [ 283.576109][ T7993] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 283.582391][ T7993] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 283.588679][ T7993] apply_to_page_range+0x3b/0x50 [ 283.593754][ T7993] kasan_populate_vmalloc+0x60/0x70 [ 283.599003][ T7993] alloc_vmap_area+0x173e/0x1870 [ 283.604085][ T7993] ? vm_map_ram+0x930/0x930 [ 283.608762][ T7993] ? __kasan_kmalloc+0x95/0xb0 [ 283.613568][ T7993] ? kmalloc_node_trace+0x3d/0xb0 [ 283.618651][ T7993] __get_vm_area_node+0x160/0x360 [ 283.624188][ T7993] __vmalloc_node_range+0x326/0x13d0 [ 283.629514][ T7993] ? array_map_alloc+0x27c/0x6d0 [ 283.634679][ T7993] ? prog_array_map_alloc+0x51/0x1b0 [ 283.640275][ T7993] ? map_create+0x49c/0xd80 [ 283.644811][ T7993] ? __sys_bpf+0x30b/0x780 [ 283.649531][ T7993] ? __x64_sys_bpf+0x7c/0x90 [ 283.654175][ T7993] ? do_syscall_64+0x4c/0xa0 [ 283.658898][ T7993] ? __cfi_selinux_capable+0x10/0x10 [ 283.664237][ T7993] ? __cfi___vmalloc_node_range+0x10/0x10 [ 283.670176][ T7993] ? cap_capable+0x1aa/0x230 [ 283.674986][ T7993] ? security_capable+0x99/0xc0 [ 283.680117][ T7993] bpf_map_area_alloc+0xd7/0xe0 [ 283.685112][ T7993] ? array_map_alloc+0x27c/0x6d0 [ 283.690192][ T7993] array_map_alloc+0x27c/0x6d0 [ 283.695014][ T7993] ? memset+0x35/0x40 [ 283.699289][ T7993] prog_array_map_alloc+0x12d/0x1b0 [ 283.704539][ T7993] map_create+0x49c/0xd80 [ 283.709001][ T7993] __sys_bpf+0x30b/0x780 [ 283.713375][ T7993] ? bpf_link_show_fdinfo+0x320/0x320 [ 283.718851][ T7993] ? __cfi_ksys_write+0x10/0x10 [ 283.723723][ T7993] ? debug_smp_processor_id+0x17/0x20 [ 283.729293][ T7993] __x64_sys_bpf+0x7c/0x90 [ 283.733919][ T7993] x64_sys_call+0x488/0x9a0 [ 283.738488][ T7993] do_syscall_64+0x4c/0xa0 [ 283.743037][ T7993] ? clear_bhb_loop+0x30/0x80 [ 283.747854][ T7993] ? clear_bhb_loop+0x30/0x80 [ 283.752640][ T7993] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 283.758656][ T7993] RIP: 0033:0x7fb2c118eec9 [ 283.763174][ T7993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.783250][ T7993] RSP: 002b:00007fb2c201a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 283.791710][ T7993] RAX: ffffffffffffffda RBX: 00007fb2c13e5fa0 RCX: 00007fb2c118eec9 [ 283.799702][ T7993] RDX: 0000000000000048 RSI: 00002000000027c0 RDI: 0000000000000000 [ 283.807771][ T7993] RBP: 00007fb2c201a090 R08: 0000000000000000 R09: 0000000000000000 [ 283.815853][ T7993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.823941][ T7993] R13: 00007fb2c13e6038 R14: 00007fb2c13e5fa0 R15: 00007fff2e5dd478 [ 283.832009][ T7993] [ 285.020255][ T8016] device sit0 left promiscuous mode [ 285.886620][ T28] audit: type=1400 audit(1760662599.159:154): avc: denied { associate } for pid=8046 comm="syz.4.2252" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 287.477128][ T8117] bridge0: port 3(dummy0) entered disabled state [ 287.483690][ T8117] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.491035][ T8117] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.506763][ T8117] device bridge0 left promiscuous mode [ 287.569913][ T8122] device dummy0 left promiscuous mode [ 287.576463][ T8122] bridge0: port 3(dummy0) entered disabled state [ 287.592269][ T8122] device bridge_slave_1 left promiscuous mode [ 287.605116][ T8122] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.626780][ T8122] device bridge_slave_0 left promiscuous mode [ 287.644076][ T8122] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.999801][ T8132] device syzkaller0 entered promiscuous mode [ 288.046510][ T8134] device sit0 left promiscuous mode [ 288.078940][ T8134] device sit0 entered promiscuous mode [ 288.421689][ T8144] device syzkaller0 entered promiscuous mode [ 288.737907][ T8163] device sit0 left promiscuous mode [ 288.836906][ T8165] device sit0 entered promiscuous mode [ 291.350914][ T8225] device sit0 entered promiscuous mode [ 293.473296][ T8259] device sit0 left promiscuous mode [ 293.484588][ T8260] device sit0 entered promiscuous mode [ 294.008966][ T8297] device pim6reg1 entered promiscuous mode [ 294.042837][ T8300] device veth1_macvtap left promiscuous mode [ 294.071849][ T8300] device macsec0 left promiscuous mode [ 294.632465][ T8306] device sit0 left promiscuous mode [ 295.092621][ T8328] device sit0 left promiscuous mode [ 296.345491][ T8376] caif0: tun_chr_ioctl cmd 35092 [ 296.948450][ T8406] -1: renamed from syzkaller0 [ 297.119739][ T8420] FAULT_INJECTION: forcing a failure. [ 297.119739][ T8420] name failslab, interval 1, probability 0, space 0, times 0 [ 297.175482][ T8420] CPU: 0 PID: 8420 Comm: syz.2.2368 Not tainted syzkaller #0 [ 297.183647][ T8420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 297.193916][ T8420] Call Trace: [ 297.197490][ T8420] [ 297.200711][ T8420] __dump_stack+0x21/0x24 [ 297.205100][ T8420] dump_stack_lvl+0xee/0x150 [ 297.209742][ T8420] ? __cfi_dump_stack_lvl+0x8/0x8 [ 297.214901][ T8420] dump_stack+0x15/0x24 [ 297.219364][ T8420] should_fail_ex+0x3d4/0x520 [ 297.224104][ T8420] __should_failslab+0xac/0xf0 [ 297.229347][ T8420] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 297.235386][ T8420] should_failslab+0x9/0x20 [ 297.240116][ T8420] __kmem_cache_alloc_node+0x3d/0x2c0 [ 297.246165][ T8420] ? __cfi_mutex_lock+0x10/0x10 [ 297.251237][ T8420] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 297.257507][ T8420] __kmalloc+0xa1/0x1e0 [ 297.261751][ T8420] ? __cfi___bpf_trace_sched_switch+0x10/0x10 [ 297.267882][ T8420] tracepoint_probe_unregister+0x1e6/0x8b0 [ 297.273733][ T8420] bpf_probe_unregister+0x61/0x70 [ 297.278897][ T8420] bpf_raw_tp_link_release+0x63/0x90 [ 297.284259][ T8420] bpf_link_free+0x13a/0x390 [ 297.288895][ T8420] ? bpf_link_put_deferred+0x20/0x20 [ 297.294342][ T8420] bpf_link_release+0x15f/0x170 [ 297.299238][ T8420] ? __cfi_bpf_link_release+0x10/0x10 [ 297.304927][ T8420] __fput+0x1fc/0x8f0 [ 297.308967][ T8420] ____fput+0x15/0x20 [ 297.312997][ T8420] task_work_run+0x1db/0x240 [ 297.317652][ T8420] ? __cfi_task_work_run+0x10/0x10 [ 297.322980][ T8420] ? filp_close+0x111/0x160 [ 297.327627][ T8420] exit_to_user_mode_loop+0x9b/0xb0 [ 297.332868][ T8420] exit_to_user_mode_prepare+0x5a/0xa0 [ 297.338538][ T8420] syscall_exit_to_user_mode+0x1a/0x30 [ 297.344054][ T8420] do_syscall_64+0x58/0xa0 [ 297.348614][ T8420] ? clear_bhb_loop+0x30/0x80 [ 297.353425][ T8420] ? clear_bhb_loop+0x30/0x80 [ 297.358259][ T8420] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 297.364251][ T8420] RIP: 0033:0x7f18f0f8eec9 [ 297.368717][ T8420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.388712][ T8420] RSP: 002b:00007f18f1eb9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 297.397170][ T8420] RAX: 0000000000000000 RBX: 00007f18f11e5fa0 RCX: 00007f18f0f8eec9 [ 297.405631][ T8420] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 297.413633][ T8420] RBP: 00007f18f1eb9090 R08: 0000000000000000 R09: 0000000000000000 [ 297.421738][ T8420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 297.429754][ T8420] R13: 00007f18f11e6038 R14: 00007f18f11e5fa0 R15: 00007ffc3570c058 [ 297.437948][ T8420] [ 297.598553][ T8430] CFI failure at __traceiter_sched_switch+0x9b/0xd0 (target: tp_stub_func+0x0/0x10; expected type: 0xee1f7a69) [ 297.605681][ T8420] CFI failure at __traceiter_sched_switch+0x9b/0xd0 (target: tp_stub_func+0x0/0x10; expected type: 0xee1f7a69) [ 297.610578][ T8430] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 297.628802][ T8430] CPU: 0 PID: 8430 Comm: syz.8.2371 Not tainted syzkaller #0 [ 297.636472][ T8430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 297.646711][ T8430] RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 [ 297.652879][ T8430] Code: 80 3c 30 00 74 05 e8 64 75 69 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 [ 297.673578][ T8430] RSP: 0018:ffffc90000e978b0 EFLAGS: 00010096 [ 297.680011][ T8430] RAX: 1ffff11025b5d336 RBX: ffff88812dae99a8 RCX: ffff888146af6540 [ 297.688168][ T8430] RDX: ffff8881096ee540 RSI: 0000000000000001 RDI: ffffc9000003d000 [ 297.696463][ T8430] RBP: ffffc90000e978f0 R08: 0000000000000000 R09: fffffbfff0ee4dde [ 297.704810][ T8430] R10: 00000000b720eca3 R11: 1ffffffff0ee4ddd R12: 0000000000000001 [ 297.713069][ T8430] R13: ffff88812dae99a8 R14: dffffc0000000000 R15: ffffffff81713a50 [ 297.721048][ T8430] FS: 00007fb2c201a6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 297.730012][ T8430] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 297.736770][ T8430] CR2: 0000200000015000 CR3: 00000001165fb000 CR4: 00000000003506b0 [ 297.744836][ T8430] DR0: 0010000010000000 DR1: 0000000000000006 DR2: 0000000000000000 [ 297.753280][ T8430] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 297.761548][ T8430] Call Trace: [ 297.765010][ T8430] [ 297.767946][ T8430] __schedule+0x1263/0x14e0 [ 297.772558][ T8430] ? release_firmware_map_entry+0x194/0x194 [ 297.778559][ T8430] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 297.784736][ T8430] preempt_schedule_irq+0x9b/0x110 [ 297.789861][ T8430] ? __cfi_preempt_schedule_irq+0x10/0x10 [ 297.795671][ T8430] ? htab_map_update_elem+0x7c5/0xb60 [ 297.801053][ T8430] ? htab_map_update_elem+0x7ea/0xb60 [ 297.806882][ T8430] raw_irqentry_exit_cond_resched+0x29/0x30 [ 297.812888][ T8430] irqentry_exit+0x37/0x40 [ 297.817424][ T8430] sysvec_apic_timer_interrupt+0x64/0xc0 [ 297.823107][ T8430] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 297.829255][ T8430] RIP: 0010:check_stack_object+0x0/0x140 [ 297.835199][ T8430] Code: e1 80 e1 07 38 c1 0f 8c 5e fd ff ff 4c 89 e7 e8 66 f8 f8 ff e9 51 fd ff ff e8 9c 89 b4 ff e9 61 fe ff ff 0f 1f 80 00 00 00 00 <55> 48 89 e5 41 57 41 56 41 55 41 54 53 50 49 89 f6 48 89 fb 49 bc [ 297.854983][ T8430] RSP: 0018:ffffc90000e97b90 EFLAGS: 00000286 [ 297.861063][ T8430] RAX: ffffffff81bb8eb3 RBX: 0000000000000000 RCX: ffff8881096ee540 [ 297.869121][ T8430] RDX: 0000000000000002 RSI: 0000000000000002 RDI: ffff88814da46460 [ 297.877180][ T8430] RBP: ffffc90000e97bd0 R08: dffffc0000000000 R09: ffffed10227d6366 [ 297.885575][ T8430] R10: ffffed10227d6366 R11: 1ffff110227d635e R12: fffffffffffffffe [ 297.893727][ T8430] R13: 0000000000000002 R14: ffff88814da46460 R15: 0000000000000002 [ 297.901842][ T8430] ? __check_object_size+0x43/0x600 [ 297.907077][ T8430] ? __check_object_size+0x61/0x600 [ 297.912572][ T8430] generic_map_update_batch+0x44a/0x780 [ 297.918140][ T8430] ? __cfi_generic_map_update_batch+0x10/0x10 [ 297.924310][ T8430] ? bpf_map_do_batch+0x39c/0x620 [ 297.929336][ T8430] ? __cfi_generic_map_update_batch+0x10/0x10 [ 297.935850][ T8430] bpf_map_do_batch+0x48c/0x620 [ 297.940789][ T8430] __sys_bpf+0x624/0x780 [ 297.945203][ T8430] ? bpf_link_show_fdinfo+0x320/0x320 [ 297.950747][ T8430] ? fpregs_restore_userregs+0x128/0x260 [ 297.956392][ T8430] __x64_sys_bpf+0x7c/0x90 [ 297.960819][ T8430] x64_sys_call+0x488/0x9a0 [ 297.965454][ T8430] do_syscall_64+0x4c/0xa0 [ 297.969880][ T8430] ? clear_bhb_loop+0x30/0x80 [ 297.974570][ T8430] ? clear_bhb_loop+0x30/0x80 [ 297.979252][ T8430] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 297.985367][ T8430] RIP: 0033:0x7fb2c118eec9 [ 297.989869][ T8430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 298.009847][ T8430] RSP: 002b:00007fb2c201a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 298.018433][ T8430] RAX: ffffffffffffffda RBX: 00007fb2c13e5fa0 RCX: 00007fb2c118eec9 [ 298.026405][ T8430] RDX: 0000000000000038 RSI: 0000200000000080 RDI: 000000000000001a [ 298.034464][ T8430] RBP: 00007fb2c1211f91 R08: 0000000000000000 R09: 0000000000000000 [ 298.042529][ T8430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 298.050779][ T8430] R13: 00007fb2c13e6038 R14: 00007fb2c13e5fa0 R15: 00007fff2e5dd478 [ 298.058965][ T8430] [ 298.062024][ T8430] Modules linked in: [ 298.066065][ T8430] ---[ end trace 0000000000000000 ]--- [ 298.066089][ T8420] invalid opcode: 0000 [#2] PREEMPT SMP KASAN [ 298.072769][ T8430] RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 [ 298.079109][ T8420] CPU: 1 PID: 8420 Comm: syz.2.2368 Tainted: G D syzkaller #0 [ 298.085266][ T8430] Code: 80 3c 30 00 74 05 e8 64 75 69 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 [ 298.094122][ T8420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 298.115582][ T8430] RSP: 0018:ffffc90000e978b0 EFLAGS: 00010096 [ 298.126002][ T8420] RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 [ 298.132161][ T8430] RAX: 1ffff11025b5d336 RBX: ffff88812dae99a8 RCX: ffff888146af6540 [ 298.138317][ T8420] Code: 80 3c 30 00 74 05 e8 64 75 69 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 [ 298.146367][ T8430] RDX: ffff8881096ee540 RSI: 0000000000000001 RDI: ffffc9000003d000 [ 298.166068][ T8420] RSP: 0018:ffffc900012277b0 EFLAGS: 00010096 [ 298.174228][ T8430] RBP: ffffc90000e978f0 R08: 0000000000000000 R09: fffffbfff0ee4dde [ 298.180721][ T8420] RAX: 1ffff11025b5d336 RBX: ffff88812dae99a8 RCX: ffff88810ceb2880 [ 298.188913][ T8430] R10: 00000000b720eca3 R11: 1ffffffff0ee4ddd R12: 0000000000000001 [ 298.197089][ T8420] RDX: ffff888122732880 RSI: 0000000000000001 RDI: ffffc9000003d000 [ 298.205234][ T8430] R13: ffff88812dae99a8 R14: dffffc0000000000 R15: ffffffff81713a50 [ 298.213202][ T8420] RBP: ffffc900012277f0 R08: 0000000000000000 R09: fffffbfff0ee4dde [ 298.221362][ T8430] FS: 00007fb2c201a6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 298.229508][ T8420] R10: 00000000b720eca3 R11: 1ffffffff0ee4ddd R12: 0000000000000001 [ 298.238690][ T8430] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 298.246793][ T8420] R13: ffff88812dae99a8 R14: dffffc0000000000 R15: ffffffff81713a50 [ 298.253649][ T8430] CR2: 0000200000015000 CR3: 00000001165fb000 CR4: 00000000003506b0 [ 298.261730][ T8420] FS: 00007f18f1eb96c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 298.269711][ T8430] DR0: 0010000010000000 DR1: 0000000000000006 DR2: 0000000000000000 [ 298.278887][ T8420] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 298.287020][ T8430] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 298.293611][ T8420] CR2: 0000000000000031 CR3: 000000014945e000 CR4: 00000000003506a0 [ 298.301842][ T8430] Kernel panic - not syncing: Fatal exception [ 298.310507][ T8420] DR0: 0000000000000000 DR1: 0000000000000006 DR2: 0000000000000000 [ 298.310522][ T8420] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 298.310535][ T8420] Call Trace: [ 298.310541][ T8420] [ 298.310552][ T8420] __schedule+0x1263/0x14e0 [ 298.310578][ T8420] ? __kasan_check_read+0x11/0x20 [ 298.310598][ T8420] ? release_firmware_map_entry+0x194/0x194 [ 298.310621][ T8420] preempt_schedule_irq+0x9b/0x110 [ 298.310641][ T8420] ? __cfi_preempt_schedule_irq+0x10/0x10 [ 298.310662][ T8420] ? dump_stack_lvl+0x119/0x150 [ 298.310680][ T8420] ? dump_stack_lvl+0x122/0x150 [ 298.310698][ T8420] raw_irqentry_exit_cond_resched+0x29/0x30 [ 298.310718][ T8420] irqentry_exit+0x37/0x40 [ 298.310742][ T8420] sysvec_apic_timer_interrupt+0x64/0xc0 [ 298.310767][ T8420] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 298.310791][ T8420] RIP: 0010:kasan_check_range+0x7f/0x290 [ 298.310816][ T8420] Code: 5c 37 ff 48 c1 eb 03 4e 8d 14 3b 4d 89 d6 4d 29 ce 49 83 fe 10 7f 26 4d 85 f6 0f 84 39 01 00 00 48 f7 d3 4c 01 db 41 80 39 00 <0f> 85 c2 01 00 00 49 ff c1 48 ff c3 75 ee e9 1c 01 00 00 44 89 cb [ 298.310833][ T8420] RSP: 0018:ffffc90001227aa8 EFLAGS: 00000246 [ 298.310850][ T8420] RAX: f3f3f300f1f1f101 RBX: ffffffffffffffff RCX: ffffffff84f2e64c [ 298.310864][ T8420] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff86fe5dc0 [ 298.310875][ T8420] RBP: ffffc90001227ac0 R08: dffffc0000000000 R09: fffffbfff0dfcbb8 [ 298.310889][ T8420] R10: fffffbfff0dfcbb9 R11: 1ffffffff0dfcbb8 R12: dffffc0000000000 [ 298.310910][ T8420] R13: 1ffff92000244f5c R14: 0000000000000001 R15: dffffc0000000001 [ 298.310926][ T8420] ? mutex_unlock+0x7c/0x220 [ 298.310950][ T8420] __kasan_check_write+0x14/0x20 [ 298.310966][ T8420] mutex_unlock+0x7c/0x220 [ 298.310987][ T8420] ? __cfi_mutex_unlock+0x10/0x10 [ 298.311008][ T8420] ? __kasan_kmalloc+0x24/0xb0 [ 298.311029][ T8420] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 298.311051][ T8420] ? __kmalloc+0xb1/0x1e0 [ 298.311076][ T8420] ? __cfi___bpf_trace_sched_switch+0x10/0x10 [ 298.311103][ T8420] tracepoint_probe_unregister+0x84e/0x8b0 [ 298.311127][ T8420] bpf_probe_unregister+0x61/0x70 [ 298.311154][ T8420] bpf_raw_tp_link_release+0x63/0x90 [ 298.311174][ T8420] bpf_link_free+0x13a/0x390 [ 298.311199][ T8420] ? bpf_link_put_deferred+0x20/0x20 [ 298.311233][ T8420] bpf_link_release+0x15f/0x170 [ 298.311248][ T8420] ? __cfi_bpf_link_release+0x10/0x10 [ 298.311265][ T8420] __fput+0x1fc/0x8f0 [ 298.311288][ T8420] ____fput+0x15/0x20 [ 298.311307][ T8420] task_work_run+0x1db/0x240 [ 298.311329][ T8420] ? __cfi_task_work_run+0x10/0x10 [ 298.311351][ T8420] ? filp_close+0x111/0x160 [ 298.311374][ T8420] exit_to_user_mode_loop+0x9b/0xb0 [ 298.311393][ T8420] exit_to_user_mode_prepare+0x5a/0xa0 [ 298.311411][ T8420] syscall_exit_to_user_mode+0x1a/0x30 [ 298.311436][ T8420] do_syscall_64+0x58/0xa0 [ 298.311453][ T8420] ? clear_bhb_loop+0x30/0x80 [ 298.311477][ T8420] ? clear_bhb_loop+0x30/0x80 [ 298.311500][ T8420] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 298.311523][ T8420] RIP: 0033:0x7f18f0f8eec9 [ 298.311538][ T8420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 298.311553][ T8420] RSP: 002b:00007f18f1eb9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 298.311570][ T8420] RAX: 0000000000000000 RBX: 00007f18f11e5fa0 RCX: 00007f18f0f8eec9 [ 298.311582][ T8420] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 298.311593][ T8420] RBP: 00007f18f1eb9090 R08: 0000000000000000 R09: 0000000000000000 [ 298.311605][ T8420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 298.311615][ T8420] R13: 00007f18f11e6038 R14: 00007f18f11e5fa0 R15: 00007ffc3570c058 [ 298.311633][ T8420] [ 298.311638][ T8420] Modules linked in: [ 298.317706][ T8420] ---[ end trace 0000000000000000 ]--- [ 298.317715][ T8420] RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 [ 298.317737][ T8420] Code: 80 3c 30 00 74 05 e8 64 75 69 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 [ 298.317752][ T8420] RSP: 0018:ffffc90000e978b0 EFLAGS: 00010096 [ 298.317766][ T8420] RAX: 1ffff11025b5d336 RBX: ffff88812dae99a8 RCX: ffff888146af6540 [ 298.317780][ T8420] RDX: ffff8881096ee540 RSI: 0000000000000001 RDI: ffffc9000003d000 [ 298.317793][ T8420] RBP: ffffc90000e978f0 R08: 0000000000000000 R09: fffffbfff0ee4dde [ 298.317805][ T8420] R10: 00000000b720eca3 R11: 1ffffffff0ee4ddd R12: 0000000000000001 [ 298.317817][ T8420] R13: ffff88812dae99a8 R14: dffffc0000000000 R15: ffffffff81713a50 [ 298.317831][ T8420] FS: 00007f18f1eb96c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 298.317847][ T8420] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 298.317860][ T8420] CR2: 0000000000000031 CR3: 000000014945e000 CR4: 00000000003506a0 [ 298.317875][ T8420] DR0: 0000000000000000 DR1: 0000000000000006 DR2: 0000000000000000 [ 298.317885][ T8420] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 299.505579][ T8430] Shutting down cpus with NMI [ 300.009514][ T8430] Kernel Offset: disabled [ 300.013903][ T8430] Rebooting in 86400 seconds..