last executing test programs: 7m50.58583403s ago: executing program 3 (id=3013): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fib_table_lookup\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) 7m50.295207631s ago: executing program 3 (id=3019): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r6}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) (async) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x8, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x8, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x2, 0x4e21, @remote}, 0x10, &(0x7f00000003c0), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1400000000000000000000000100000003000000000000001c0000000000000000000000080000009cc0156bb2b08beaa7", @ANYRES32=0x0, @ANYBLOB="ac1e01017f000001000000001400000000000000000000000200000009000000000000008c00000000000000000000000700000044141d6000000000000000060000000700008000442cce93ac1414aa00008602ac1414aa00000002ac1414150b6d16570a01010100000007e0000002000000088327630a010100640101017f000001ffffffff7f000001ffffffffac1e0001ffffffffac1414aa8307dbac141411070b0dffffffffe000000200000000000000140000000000000000000000010000000700000000000000"], 0xf8}, 0x11) (async) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x2, 0x4e21, @remote}, 0x10, &(0x7f00000003c0), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1400000000000000000000000100000003000000000000001c0000000000000000000000080000009cc0156bb2b08beaa7", @ANYRES32=0x0, @ANYBLOB="ac1e01017f000001000000001400000000000000000000000200000009000000000000008c00000000000000000000000700000044141d6000000000000000060000000700008000442cce93ac1414aa00008602ac1414aa00000002ac1414150b6d16570a01010100000007e0000002000000088327630a010100640101017f000001ffffffff7f000001ffffffffac1e0001ffffffffac1414aa8307dbac141411070b0dffffffffe000000200000000000000140000000000000000000000010000000700000000000000"], 0xf8}, 0x11) 7m49.948234253s ago: executing program 3 (id=3022): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000f00000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x0, 0x0, 0x7, 0x2, 0x2400, r4, 0x497edd22, '\x00', r3, 0xffffffffffffffff, 0x2, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@float={0xb, 0x0, 0x0, 0x10, 0xc}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x5}]}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x5d, 0x0, 0x6a, 0x2}, @typedef={0xf}, @enum64={0xb, 0x1, 0x0, 0x13, 0x1, 0x4, [{0x3, 0x90, 0x7ff}]}]}, {0x0, [0x61]}}, &(0x7f0000000540)=""/35, 0x6f, 0x23, 0x0, 0x6, 0x10000, @value}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000880)={0x2, 0x4, 0x8, 0x1, 0x80, r6, 0x89, '\x00', r3, r7, 0x4, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2000000000c8, 0x0, 0x4, 0x0, 0x0, 0xb, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f00000003c0)={&(0x7f00000002c0), 0x6e, &(0x7f0000000340), 0x0, &(0x7f0000000380)}, 0x10001) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r4, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x14, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r12, &(0x7f00000001c0), 0x20000000, 0x2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r12}, &(0x7f0000000340), &(0x7f00000004c0)=r2}, 0x20) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r13}, 0x10) syz_clone(0x630c9000, 0x0, 0x52, 0x0, 0x0, 0x0) 7m49.839759724s ago: executing program 3 (id=3027): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x4, 0x8, 0x9, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x880, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 64) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async, rerun: 32) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) (async, rerun: 32) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r1, &(0x7f0000000280), 0x0}, 0x20) (rerun: 32) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) close(r9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000640000006400000007000000050000000000001105000000090000000300000006000084b146ffff0800000003000000ff01000008000000000000000800000005000000faff0000030000000000000000000000090000000d00000000000000090000000900000004000000000000000000302e000000"], &(0x7f0000000000)=""/41, 0x83, 0x29, 0x0, 0x1, 0x0, @void, @value}, 0x28) 7m49.487931456s ago: executing program 3 (id=3038): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000100001def6527d9fec21a5547a559283745041468e573994a05b40b32f75c786698e84afd9ddbef64272ac51140738503f428e8929b880277e804018e94bcf35ae00737122710bf5d3693ac2e117f6abe81825f1ad07d8caae805fb8d52cdb9de229b6076b40e51cfc65539fb1d22b02077316db02b52e9ca8ce27c080caecbc89a551f02c202fd45c6846090d43e724ddbab88ab08a2db5d9b27d5937677a8c286a33191"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="170000000000000004000000ff000000000000008ba1a5bd1aa01f6aa012a164d16b9cf33e6aa919d2fb8f6ded6ac67bd79007d02d956c0d4aadf146fb68083b8d1b5589e6b79c79167afe4d7385be10dadc3a42c1354a6c39de7f60fa7b321461695bfd8ab6a06452862c848a3c1a94ff83341fee62ef598f0c6277a1a179ee6055679fd18271ea434e97d21ef79779ef0d18b41790bb13fcff90aeca0fdff1b01e2403fa826e1af45c17e9468a5aa9", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000"], 0x1b) (async) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) ioctl$SIOCSIFHWADDR(r3, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000030000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000008f300000000000000000"], 0x48) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f00000006c0)=""/201, 0x45, 0xc9, 0x0, 0x4, 0x0, @void, @value}, 0x28) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x402b, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0xdae, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x15, 0x2, 0x7, 0x5000, r5, 0x9bd5, '\x00', 0x0, r4, 0x1, 0x3, 0x5, 0x7, @void, @value, @void, @value}, 0x50) 7m32.764609486s ago: executing program 32 (id=3038): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000100001def6527d9fec21a5547a559283745041468e573994a05b40b32f75c786698e84afd9ddbef64272ac51140738503f428e8929b880277e804018e94bcf35ae00737122710bf5d3693ac2e117f6abe81825f1ad07d8caae805fb8d52cdb9de229b6076b40e51cfc65539fb1d22b02077316db02b52e9ca8ce27c080caecbc89a551f02c202fd45c6846090d43e724ddbab88ab08a2db5d9b27d5937677a8c286a33191"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="170000000000000004000000ff000000000000008ba1a5bd1aa01f6aa012a164d16b9cf33e6aa919d2fb8f6ded6ac67bd79007d02d956c0d4aadf146fb68083b8d1b5589e6b79c79167afe4d7385be10dadc3a42c1354a6c39de7f60fa7b321461695bfd8ab6a06452862c848a3c1a94ff83341fee62ef598f0c6277a1a179ee6055679fd18271ea434e97d21ef79779ef0d18b41790bb13fcff90aeca0fdff1b01e2403fa826e1af45c17e9468a5aa9", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000"], 0x1b) (async) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) ioctl$SIOCSIFHWADDR(r3, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000030000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000008f300000000000000000"], 0x48) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f00000006c0)=""/201, 0x45, 0xc9, 0x0, 0x4, 0x0, @void, @value}, 0x28) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x402b, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0xdae, 0x8}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x15, 0x2, 0x7, 0x5000, r5, 0x9bd5, '\x00', 0x0, r4, 0x1, 0x3, 0x5, 0x7, @void, @value, @void, @value}, 0x50) 5m56.447333276s ago: executing program 0 (id=4198): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a180500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xc, 0x10, &(0x7f0000000500)=@raw=[@ringbuf_query, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x5a2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}], &(0x7f0000000580)='syzkaller\x00', 0x8d, 0x0, 0x0, 0x40f00, 0x30, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x8, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, r0, 0x1, 0x0, &(0x7f0000000600)=[{0x5, 0x4, 0xb, 0xb}], 0x10, 0xfffffff6, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, [@call={0x85, 0x0, 0x0, 0x5c}, @jmp={0x5, 0x0, 0xd, 0x8, 0x0, 0xffffffffffffffff, 0x4}, @map_fd={0x18, 0xb, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000100)='GPL\x00', 0x80, 0xa8, &(0x7f0000000200)=""/168, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x5, 0x3, 0x100}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000300)=[{0x4, 0x5, 0xe, 0x5}, {0x0, 0x1, 0x1}], 0x10, 0x1, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffc4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='siox_get_data\x00', r1, 0x0, 0x6}, 0x18) 5m56.388016507s ago: executing program 0 (id=4201): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000500)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x10bc3a4ad10cb91d}}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000040)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='devices.list\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x5, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000090000000000000000000018d70000", @ANYBLOB="0000000000000000b702000014000000b703000000000000850000002a000000bf0900000000000066090600000003e704000000060000001801000001006c2500000000002020207d9af8ff00000000ad9107000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b70000000000000095000000b187b1fea2504e"], &(0x7f0000000a00)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000000)=r4, 0x12) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) 5m56.299339497s ago: executing program 0 (id=4204): r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000016c0)=ANY=[@ANYBLOB="1801efffff7f00bdf57a02aa009bdf71bbc1b1e5de333a891dba43040600368a4828b331d1945ba878189c41bb40c662e5f5e2476c8c28dd857e2c436ce0479643abc8aa90e096a8a13de3d2881d730305e9e9a0831d519f591174c77da71af433df5a59468406919e88cbb848bcac1d49c62c7d3be90aecef2c136bfc772c097f523dbdcc08014c36689c387801424b37cf77aacd99f612322a293c4a4bc26e7fca1643dc900ec1023016755e6f87519471175e71e9780845beba50445950a2f6363c5cfcc9ce149218e7f3a2bf3887b16f17c040ff1203534e68ed9bb3ba5de02e1b7cd6dea1c6f66851657b", @ANYRESOCT=r0, @ANYRES8, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x4b, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000007b431777531c6a1fabace387c6e1bb2622e98134e01c9b2c533892cfddae8d8923a89be06529e4dfecb85ca06ebddd3dc308ae99939c25a409c4b1eaef8ed6c811ad9af3535c53d25cc58f50ef496053652e3f664303c5c2d5efdb29393300a2e14d7a1b8823752e71efb6e38d92b2031fe1570645e7bf004497601a94becc0fce3f243149cec3cc46025b5db9c9dca4668d04bebab2b692e9793b3972afb1b901883452d11e6932748a357e17659b347396e157787082bf320807125fb839045c75fa6c138bc0f1744a98d0eaa87a8f7e0800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xd, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b9", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x16) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000480)='mm_page_alloc\x00', r7}, 0x10) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800083}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r8, 0x40047451, 0x2000000c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89a0, &(0x7f0000000080)) ioctl$TUNGETFILTER(r9, 0x801054db, &(0x7f00000005c0)=""/4096) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080)) 5m56.223324538s ago: executing program 0 (id=4209): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x81}, 0x0, 0xc8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x2, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x81}, 0x0, 0xc8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x82, 0x82, 0x3, [@enum={0xf, 0x2, 0x0, 0x6, 0x4, [{0xa, 0x100000}, {0x7, 0x9}]}, @datasec={0x7, 0x6, 0x0, 0xf, 0x2, [{0x3, 0x400, 0x1}, {0x2, 0x5, 0x9}, {0x3, 0x4, 0x206}, {0x5, 0x4, 0x6}, {0x2, 0x5, 0x225}, {0x1, 0x7, 0x8}], "cad8"}, @var={0xd, 0x0, 0x0, 0xe, 0x4, 0x1}]}, {0x0, [0x61]}}, &(0x7f0000000300), 0x9f, 0x0, 0x1, 0x9, 0x0, @void, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r3, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000500d5547f"], 0x0, 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=[0xffffffffffffffff], 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x9, '\x00', r4, r2, 0x5, 0x4, 0x1, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, r0, 0x0, '\x00', r4, r2, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x46, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x46, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r12}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001001000850000008200000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001001000850000008200000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r13}, 0x10) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r14, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100036c00fe08000000000200875a65969ff57b00000000000000020000000000ac1414aa"], 0xfdef) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x2, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000002a00)="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", 0xda1}], 0x1, 0x0, 0x0, 0x800}, 0x4004) 5m56.211784387s ago: executing program 0 (id=4210): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x44) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000040)='percpu_alloc_percpu\x00', r2}, 0x10) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x5, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000083669003000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000019000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 5m56.147637328s ago: executing program 0 (id=4213): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x86) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x40047452, 0x2000000c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_freezer_state(r5, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xdb) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000280), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_freezer_state(r6, &(0x7f0000000040)='FROZEN\x00', 0x7) r8 = openat$cgroup_procs(r5, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000180), 0x12) close(r6) write$cgroup_freezer_state(r6, &(0x7f0000000080)='THAWED\x00', 0x7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 5m41.176109808s ago: executing program 33 (id=4213): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x86) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x40047452, 0x2000000c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_freezer_state(r5, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xdb) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000280), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_freezer_state(r6, &(0x7f0000000040)='FROZEN\x00', 0x7) r8 = openat$cgroup_procs(r5, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000180), 0x12) close(r6) write$cgroup_freezer_state(r6, &(0x7f0000000080)='THAWED\x00', 0x7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 3m38.227928722s ago: executing program 5 (id=5585): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x2, 0x1, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000400000000000000000000000080000000000040000000000000c927506577c7aeb3c8dbcc630bb3539682927b90f81f720a6a3cdbf10508940e5d8731927393169379abdc8c12011ea4ec7dc804e0000006000000000000000000000000000000000000a6204160489b20c228689aa07cd3114d8e08e8fcaca798c10085dc33d0b11ed38e1a40ef55b6db57cbd9b28491cf7e78b3279d368fe946b3233c003683c97b1ebf68e05570e94e9cb7728f4630c8425850c999e155b9ba4ca4f7ba41d12d9e42641d0e058775"], 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r4, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f00000006c0)=[0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0], 0x0, 0x14, &(0x7f0000000740)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x1e, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x7, [@type_tag={0x6, 0x0, 0x0, 0x12, 0x1}, @typedef, @union={0xd, 0x1, 0x0, 0x5, 0x1, 0x8a5, [{0x7, 0x5, 0x9}]}, @enum64={0x2, 0x1, 0x0, 0x13, 0x1, 0x5029d1cf61e6a6c1, [{0x8, 0x6, 0x8}]}, @var={0xb, 0x0, 0x0, 0xe, 0x1}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x7d, 0x0, 0x50, 0x2}, @struct={0xa, 0x4, 0x0, 0x4, 0x1, 0x5, [{0xa, 0x4, 0x5}, {0xb, 0x5, 0x6}, {0x3, 0x1, 0x3}, {0x8, 0x1, 0x5aae}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x4, 0x2}, {0xc, 0x5}, {0x8, 0x5}, {0x8, 0x3}]}]}, {0x0, [0x0, 0x5f, 0x2e, 0x61, 0x61]}}, &(0x7f0000000b40)=""/207, 0xef, 0xcf, 0x0, 0x0, 0x10000, @value}, 0x28) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=@base={0xe, 0x7ffb, 0x56c85db2, 0xfffffffc, 0x400, r5, 0xfffffff0, '\x00', 0x0, r7, 0x2, 0x8000402, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_freezer_state(r10, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r11, &(0x7f0000000040)='FROZEN\x00', 0x7) (async) r12 = openat$cgroup_procs(r10, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r12, &(0x7f0000000180), 0x12) (async) write$cgroup_freezer_state(r11, &(0x7f0000000080)='THAWED\x00', 0x7) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, 0x0, 0x0}, 0x20) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x2, 0x4, 0x104, 0x8, 0x1014, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x1, r13, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r14, &(0x7f0000000300), 0x20000000}, 0x20) (async) sendmsg$unix(r2, &(0x7f0000000040)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) 3m23.211912423s ago: executing program 34 (id=5585): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x2, 0x1, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000400000000000000000000000080000000000040000000000000c927506577c7aeb3c8dbcc630bb3539682927b90f81f720a6a3cdbf10508940e5d8731927393169379abdc8c12011ea4ec7dc804e0000006000000000000000000000000000000000000a6204160489b20c228689aa07cd3114d8e08e8fcaca798c10085dc33d0b11ed38e1a40ef55b6db57cbd9b28491cf7e78b3279d368fe946b3233c003683c97b1ebf68e05570e94e9cb7728f4630c8425850c999e155b9ba4ca4f7ba41d12d9e42641d0e058775"], 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r4, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f00000006c0)=[0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0], 0x0, 0x14, &(0x7f0000000740)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x1e, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x7, [@type_tag={0x6, 0x0, 0x0, 0x12, 0x1}, @typedef, @union={0xd, 0x1, 0x0, 0x5, 0x1, 0x8a5, [{0x7, 0x5, 0x9}]}, @enum64={0x2, 0x1, 0x0, 0x13, 0x1, 0x5029d1cf61e6a6c1, [{0x8, 0x6, 0x8}]}, @var={0xb, 0x0, 0x0, 0xe, 0x1}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x7d, 0x0, 0x50, 0x2}, @struct={0xa, 0x4, 0x0, 0x4, 0x1, 0x5, [{0xa, 0x4, 0x5}, {0xb, 0x5, 0x6}, {0x3, 0x1, 0x3}, {0x8, 0x1, 0x5aae}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x4, 0x2}, {0xc, 0x5}, {0x8, 0x5}, {0x8, 0x3}]}]}, {0x0, [0x0, 0x5f, 0x2e, 0x61, 0x61]}}, &(0x7f0000000b40)=""/207, 0xef, 0xcf, 0x0, 0x0, 0x10000, @value}, 0x28) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=@base={0xe, 0x7ffb, 0x56c85db2, 0xfffffffc, 0x400, r5, 0xfffffff0, '\x00', 0x0, r7, 0x2, 0x8000402, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_freezer_state(r10, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r11, &(0x7f0000000040)='FROZEN\x00', 0x7) (async) r12 = openat$cgroup_procs(r10, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r12, &(0x7f0000000180), 0x12) (async) write$cgroup_freezer_state(r11, &(0x7f0000000080)='THAWED\x00', 0x7) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, 0x0, 0x0}, 0x20) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x2, 0x4, 0x104, 0x8, 0x1014, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x1, r13, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r14, &(0x7f0000000300), 0x20000000}, 0x20) (async) sendmsg$unix(r2, &(0x7f0000000040)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) 31.55073725s ago: executing program 6 (id=7520): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x3, 0x5, 0x1000, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x20100, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r7}, 0x3d) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r8}, 0x10) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r9}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000df007e0000000000000002", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 31.238907801s ago: executing program 6 (id=7522): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000001b0000000000000000b3a28e1062a2f879"], 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) (async) r2 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) (async) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/24], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) close(r6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 30.468520466s ago: executing program 6 (id=7532): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x2, 0x9, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000000)={'geneve1\x00', 0x400}) close(r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000838500000071000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r8) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) 27.84317418s ago: executing program 2 (id=7562): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x2}]}, {0x0, [0x2e, 0x2e, 0x5f]}}, &(0x7f0000000500)=""/242, 0x29, 0xf2, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000000)='//.{$\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) 27.7557012s ago: executing program 2 (id=7564): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001280)={{r0}, &(0x7f0000001040), &(0x7f0000001080)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000002480)='sched_switch\x00', r2, 0x0, 0x1}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) unlink(0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000001000), 0x4c00, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000001000), 0x4c00, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001140)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00'], 0x50) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00'], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB="000d00000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r4}, &(0x7f0000000080), &(0x7f0000000300)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002400)={r1, 0x0, 0x94, 0xa3, &(0x7f00000011c0)="1ead318ad0a3acb0ecd1bb1ce73bb3f06c63f59ba2a84d3abca4079b76acad147d89aa0bcd023371e764e26716729b8b5c6e1132232330f0ad7f4503ae87229401e7edfe394f179f1d271c6770ea6b711ec6741ee25a770ddf5a235ce3efe8705b3048c1f2b543a1b4919a9a191c16408c96186b342f48b8b0d2276b74063caef873e32f01cead710600a22fa48a46c6a38f1fba", &(0x7f0000001340)=""/163, 0x5, 0x0, 0x1000, 0x0, &(0x7f0000001400)="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", &(0x7f0000001040), 0x2}, 0x50) 27.267942353s ago: executing program 4 (id=7568): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000040), &(0x7f0000000080)='%ps \x00'}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000081"], 0x48) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xe) 27.216640313s ago: executing program 4 (id=7569): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_discard_preallocations\x00', r2, 0x0, 0x6}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) close(r1) close(r0) 27.177624753s ago: executing program 7 (id=7570): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r1, 0x8004745a, 0x2000000c) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) r4 = openat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000100)='blkio.bfq.idle_time\x00', 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={&(0x7f0000000240)="50bb4f61ab50f3572f89e9f96a64f09a1a470e71ff4d884382b5900d2829ea796556736bd8c2b2fcb967a2651627ca3eb3402dca2ea576012b2190a9fc3299f42804d06809671dace52bb8daa8403b1d29740abebb1b0dde1cdc37e960490af2b97784f02348de0ebd42008607631b98c6aed51ee1f728102f3d753acfe4ee32462ff4da720c965ac6e8b57fb633ba81291a62c66fcf01a496c7bba5fc4a709431404e2eca9d91b53c6195a033d8f35177a167c1c519398775953d86a7f041f44018df32ad932070e9946f05fae921983bdf3bb181fd8aaf5ea6d2419062", &(0x7f0000000340)=""/165, &(0x7f0000000440)="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", &(0x7f0000000540)="628109aa877c12a210ac419886da069a72c7b5854409e209bb085f1a66fefc19fb004f6d647368f12d85032e5ae17bb9219c04ec7e5554829f2c7993df65383330c339cdfb4d2ad343cfbe4e9540b6f348ec120bb8bbd2496eb4c8c05fccd0b6d031f124843eae5e7e14e160bda588", 0x8, r5, 0x4}, 0x38) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lsm, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r6}, 0xc) write$cgroup_subtree(r3, &(0x7f0000000640)=ANY=[@ANYRESHEX=r1], 0x5) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="2b637075208ebb90d3f03f79621ba8729f1cfbe09d53633c41f2c7dc6e354454833597739ee23dbfd2eeba78d993d9989facfefbd5024170fed3656654923a3b71fdced800870f77ff232f3d4b244db5456a0fce34b0ff0b20d81d6ccfcf1bdead243599e37468d58e953c78943131eb599eecdb4ab50c9e4e1c41fb07a60f8fe43b49940a369a3ffcd4fc837c6c562ad9de29eec1a335d9bd0b7258f94798190493b51259c9f83bd4fb44d1ed9f21e24e199dbaebfd06f233dd066e67d550ea"], 0x5) 27.057513254s ago: executing program 4 (id=7571): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000006b114900000000008510000002000000850000000800000095000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000004000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000004000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000d40)={0x0, 0x0, 0x0}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000300d20c0ecbb194380000000000000000092c79a80000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) close(r9) (async) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) (async) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) sendmsg$tipc(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r5, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(r5, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r11}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r11}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000140)='hrtimer_init\x00', r0}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 26.913789865s ago: executing program 4 (id=7572): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r3}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffff21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000a7f1ffff000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r8, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x0, 0x3, 0xffffff9b, 0x7f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0, 0x10, 0x7, @void, @value}, 0x94) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000006c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 26.888198405s ago: executing program 7 (id=7573): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c40)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1282, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) (async) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) write$cgroup_int(r1, &(0x7f0000000040)=0x4, 0x12) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'ipvlan0\x00'}) (async, rerun: 32) close(r4) (rerun: 32) 26.733629946s ago: executing program 7 (id=7574): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'veth1_to_bridge\x00'}) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r5, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r5, 0x0, 0x20000000}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x5, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r6}, &(0x7f0000000540), &(0x7f0000000640)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0x1}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{}, &(0x7f0000000240), &(0x7f0000000280)=r0}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x2}, 0x8) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x76bfe9ba, 0x0, 0xffffffffffffffff, 0xd0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@bloom_filter={0x1e, 0x6, 0x7ff, 0x5, 0x20000, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x2, 0x7, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000880)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x7ce, '\x00', 0x0, r0, 0x5, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000f40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 26.732549866s ago: executing program 2 (id=7575): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x16}, 0x0) write$cgroup_pid(r2, &(0x7f0000000580), 0x12) (async) socketpair(0x10, 0x0, 0x14, &(0x7f0000000040)) 26.677058516s ago: executing program 2 (id=7576): getpid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000000380), 0x2, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000002b00), 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x4030582b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r4, 0x20, &(0x7f00000002c0)={&(0x7f0000000500)=""/99, 0x63, 0x0, &(0x7f00000006c0)=""/225, 0xe1}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000020020000", @ANYRES32=0x1, @ANYBLOB="00001400000000000001000000000000000000198f234a00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000240)={0x2}, 0x8) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) sendmsg(r5, &(0x7f0000000600)={&(0x7f0000000580)=@hci={0x1f, 0x1}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000a40)=[{0xe8, 0x10c, 0xe48a, "f904c18f7b4b979d94dc6d20067d83380446b2a06b704f491a41d5e330302212f60703b29e036b3c24868a6d5f4a58764be86780b4f8ece3e9133ed869b6c381624a3f66133a15f175f7cb8ffe1778a12effb4dce563a917d6f2e291d6d85ab79780315d096cc3652afbc2874c8cc18fd5e54d7662a88bc2ff42f375098cad702eeb7645ce19fc4dc52b220f1f95a4817d1392ffd190d66e1a58d659911664c320944f0f793f104e463d5be7c656483374783975660769bd1aba9836765dd9260a1a986548a8d1f5bd9ba1ea22a8acc57b6202"}, {0xb8, 0x113, 0x0, "874461dcf21f1883dff03a064bd00268d4d034a0d2737999d4283fae5650bb851007419240d9dadbab5e3faa441472de3b3a9d5536908f77cc7964629fc8fabcec24a677161bd86aafd8211a4a1c483b5a123670721625724f42833e7a79e43f4919974fe8584005f9a3e4fb4058a3264cd59834e08c6a33cae75bfb0f1c84f2732160c45fce7ef8b448ac785dab62891486e2d741ca971cd2e5147db62e789fab"}, {0xe0, 0x104, 0x8, "f8634957a40b0f9eb8e3f300234f5e87757c5504e91a223eb1674d3e61b5190e369f12631267126b27b3fb53819e078b10a009e35c4c644752d5be14a87296c1c9e0c3b2c42303bbee95ff8f8d215ac4c06bae37893b28067c6e51d01289eaf77808b3fcca2280fc77edbd72012d1d090f2dad0e7b2a760be95c2d619cc7bde7ceb2b10de0ba0b8d403f0f8909922237bc058aceee20d020d26d68007910b42e22c4895d47a8a62e279afe3a06e6e3cb384c9c9d3a98f0f569216193fc62a29a941214d7fb012a8d12"}, {0xc8, 0x29, 0x7, "5dc8ea20cf9df67008b6cb687b386930230176ac26a777003aee48fe62ee4e40db92ab277de9dbf4699a880f0a9b08248dc3f72118d1070b23aba43e31dc373cb30e688c71e8f749073b3940d37e410c541b62bb503e654433a20bcdf0011830e93c6d1eaaec591004bf45033186d22855701edb392da04b21bc34359603bd56cd3f719432a664dacea98a6e20efe27acdcd2ebda51a0f6d2361e8f704504f6245122ee5a191c7fc36b2117c64476b157364c35d"}, {0xb8, 0x107, 0x0, "67e8286bb9e116a8d8a45832da88e0d35ef0ac769be64c82d448d8ea292e14b0a0022be48c09832046b3821af621ea16084f05710bcc91c7dd9afa6824a251f0e4cd99e70343bccdec978c2ea37999e317a19298038775052d86e7d43030ca1b0064ed0f251c233dc34f6be9c66919ad0b967c35a4e298f0000067b8dd0b4d8414ec64d6dc8f71002948111d4e883a7135da62ffe401c15274627dd222953be39bc5"}, {0x100, 0x10f, 0xfffffffe, "b8454dac7abafec34ff5ecb7f02dd7a55981e8b44bc7003d067bc49c53037c04fe2df94c15fbd84e0f4c159a65fe1d0811e49c45e664e7f06d6e0d684dced87bf72ea463b375ac259a0c548c1a7ed5b99d8c04504e71bfc80bb0c042377a06fec64fb8661aad4c6f75d0aca86832798d9e484b82967ae89ea263bad3a55a61d521a71d639dcd4d65888070deb9b4af37003018c416ca2fe816b6edf53e37c2250c7003a1f1ad53f39183fcdd75a01f51db369f6ee690b369235ae36d2efff8885e538fa45dab95b65443bd3bfd5552cd92a2654aa8d01525994bb95194fcca5b77a05f98ece8650069a2"}, {0x38, 0x0, 0xd, "92a24d1fb39eb7c27c19493a9ecda514bfc77573636af6b147d185e64da7938d870d662540"}, {0x20, 0x107, 0x55a, "bf2255d883d0c0fea8ba35db6435"}, {0xb0, 0x10f, 0x1, "375ddc9025a99902c6a341abd3529bf0daa56bf947d54cefe2cad086656591dac3d9eb235f2ca5bf8f9b0238510c63f4ae3b95ca0d0e34591ee0a11b35867612bce7ad8e2bc54f64a8a544bd7228f6064359da72f77fa9affc320619486c146bc62c9c479c2d377b8d8dd39ad9bf89a63d48fcaed8ecca5c673509395ca035a87ba731ae958f1a5c2c9ab5a62e2b461929279c0ff492d042379f39758971bd18"}, {0x68, 0x118, 0xd4c, "4cfc216cac67842c31d3eba8bd378ec53edb30c5a6d1a30cb82ba6d495b9cb3daa51497904b9cd0902cfed9196a12d451c3098eefffbb22a09bdb148be303ad148d968c1343509767118ea4e935601cce1dd4d30"}], 0x670}, 0x4000000) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'veth1_to_bridge\x00', @random="a9f675fc4b24"}) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r7, 0x8982, 0x20000000) 26.246795469s ago: executing program 6 (id=7580): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8=0x0, @ANYRES32=r3, @ANYRESDEC, @ANYRES64=r0, @ANYRESDEC=r2, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x45, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 26.238870788s ago: executing program 1 (id=7581): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) recvmsg$unix(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40010002) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="8fff0f0000000000007538e486dd630080fcfc0829080000000000000000875a060300000002000000000000000000000000ac1414aa"], 0xfdef) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0xb}, 0xfffffffffffffe76) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@name={0x1e, 0x2, 0x0, {{}, 0x4}}, 0x10, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1c, 0x14, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 26.231778338s ago: executing program 6 (id=7582): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x3, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ea, 0x9}, 0x0, 0x0, 0xfffffffe, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fef2000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r3, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r5}, 0x10) syz_clone(0x41500, 0x0, 0xd, 0xfffffffffffffffd, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000000000000000000030000000002000000020000000200000000000000000000010500000010000000010000000000000e01000000000000000061"], 0x0, 0x53, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 26.201998988s ago: executing program 7 (id=7583): r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x20, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x37}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6d8}}, @map_idx_val={0x18, 0x13, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x80000001}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000180)='GPL\x00', 0x9, 0x46, &(0x7f00000001c0)=""/70, 0x40f00, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0xe, 0xabc, 0x7}, 0x10, 0x18d43, r1, 0x2, &(0x7f00000002c0)=[r1, r1], &(0x7f0000000300)=[{0x5, 0x1, 0x3, 0x5}, {0x5, 0x1, 0x0, 0x7}], 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x8e, 0xa1, &(0x7f0000000400)="544810bace3a70aeca082742b2e8f3c09fa620931e55c14e38015b6ff769199cab8a7c630720f8c199a340af2127dbcc54aa7055663f83e77c6e9abef433b345d4e8a4fd185a85c8f87adf4b1a10704462bb8969ece60c2eecbef8b0e33ef38fef69d37a238f08919c5df9ea39525adf95037f757afa5583c99c1692382d8dd4383c0780c33b464610543260b17d", &(0x7f00000004c0)=""/161, 0x0, 0x0, 0x68, 0x4, &(0x7f0000000580)="6ca26f46d7b42a20c9ed118275d01e59573ca5acd75a3c17eb892fabd824fe94f2bd82ee14afbdbb25b6f59143c2af7a4be420effed71af6f5667e21ab1788f37f3a3e084ce635bf34036e699fb7f14e49e88386a8589b31500356e6431122a474f3748d33ef552b", &(0x7f0000000600)="b3bf7b2e", 0x4, 0x0, 0x100}, 0x50) (async) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000006c0)={'wg0\x00', 0x400}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={@map=r1, 0x9, 0x0, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000880)={@fallback=r0, 0xffffffffffffffff, 0x36, 0xd, r1, @void, @value=r1, @void, @void, r4}, 0x20) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0x2}}]}, {0x0, [0x2e, 0x61]}}, &(0x7f0000000900)=""/136, 0x34, 0x88, 0x0, 0x2, 0x0, @void, @value}, 0x28) openat$cgroup_int(r1, &(0x7f0000000a00)='cpu.weight.nice\x00', 0x2, 0x0) r6 = syz_clone(0x8000, &(0x7f0000000a40)="b1c9f1ec4cb8a3b3304bb916e87a419df44fd60c23bff3c6f23598322e986dd9eb1a657800383daf05e71bd65931f3bf4fc659c92c96532f2acd53d001feec8c0c4aa49774efe2f55e", 0x49, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="7b3429b20df6909fbd2caee9a5156da69e917c5418dd4f33184066d113319623e06754248543251a6be1ece1fcea9d8c") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000b80)='rxrpc_connect_call\x00', r1, 0x0, 0x1}, 0x18) (async) write$cgroup_pressure(r1, &(0x7f0000000c00)={'full', 0x20, 0x3, 0x20, 0xfffffffffffffff3}, 0x2f) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c40)={0xffffffffffffffff, 0x0, 0x18}, 0xc) socketpair(0x1a, 0x1, 0x7fff, &(0x7f0000000c80)={0xffffffffffffffff}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r7, 0xffffffffffffffff}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r3, 0x58, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x18, 0x16, &(0x7f0000000d80)=@raw=[@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3fe0}}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xfffffff8}, @ldst={0x0, 0x0, 0x0, 0x0, 0x8, 0x104, 0x10}, @call={0x85, 0x0, 0x0, 0xa3}], &(0x7f0000000e40)='GPL\x00', 0x9, 0x9b, &(0x7f0000000e80)=""/155, 0x41000, 0x10, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001000)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000001040)={0x4, 0x6, 0x8000, 0xe6a2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001080)=[r3, r7, r3, r3], &(0x7f00000010c0)=[{0x2, 0x5, 0x3, 0x3}, {0x0, 0x5, 0x4, 0x5}, {0x1, 0x3, 0xe}, {0x0, 0x5, 0x5, 0x4015f76502d04982}], 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000011c0)=@base={0x11, 0x9, 0x7, 0x2, 0x8000, r3, 0x8, '\x00', r11, r1, 0x1, 0x1, 0x1, 0x0, @value=r5, @void, @void, @value}, 0x50) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001280)={&(0x7f0000001240)='ext4_fc_replay\x00', r12, 0x0, 0x8000}, 0x18) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000012c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001780)={r8, 0xe0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000014c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000001500)=[0x0, 0x0], &(0x7f0000001540)=[0x0, 0x0, 0x0], 0x0, 0x19, &(0x7f0000001580)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000015c0), &(0x7f0000001600), 0x8, 0xf1, 0x8, 0x8, &(0x7f0000001640)}}, 0x10) (async) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x8ef, '\x00', r11, r5, 0x4, 0x0, 0x5, 0x0, @void, @value, @void, @value}, 0x50) (async) r16 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001840)={r10, 0x5, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xd, 0xe, &(0x7f0000001300)=@raw=[@generic={0x7f, 0x5, 0x0, 0x0, 0xfffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}}, @generic={0xb9, 0x9, 0x7, 0x6, 0x8}, @btf_id={0x18, 0xe, 0x3, 0x0, 0x5}, @exit], &(0x7f0000001380)='syzkaller\x00', 0xda, 0x73, &(0x7f00000013c0)=""/115, 0x41100, 0x48, '\x00', 0x0, @sock_ops, r5, 0x8, &(0x7f0000001440)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001480)={0x5, 0x5, 0x2, 0x9}, 0x10, r14, r1, 0x0, &(0x7f0000001880)=[r1, r7, r7, r15, r16, r3, r9], 0x0, 0x10, 0x6, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001980)='./cgroup/syz1\x00', 0x1ff) (async) r17 = openat$cgroup_procs(r1, &(0x7f00000019c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r17, &(0x7f0000001a00)=r6, 0x12) (async) r18 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001cc0)={0x0, 0xa, &(0x7f0000001a80)=@raw=[@generic={0x4, 0x7, 0x0, 0x401, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2}, @generic={0x2, 0x1, 0xe, 0x4, 0x1}, @map_val={0x18, 0x0, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @map_fd={0x18, 0x0, 0x1, 0x0, r9}, @jmp={0x5, 0x0, 0x3, 0x4, 0x5, 0x80, 0x10}], &(0x7f0000001b00)='GPL\x00', 0x0, 0x48, &(0x7f0000001b40)=""/72, 0x41100, 0x2, '\x00', r13, 0x0, r1, 0x8, &(0x7f0000001bc0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000001c00)={0x2, 0x6, 0x58c1, 0x9}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000001c40)=[{0x1, 0x5, 0x9, 0xc}, {0x0, 0x4, 0x2, 0xb}, {0x0, 0x1, 0xe, 0x8}, {0x1, 0x3, 0x3, 0xb}, {0x0, 0x4, 0x9, 0x6}, {0x4, 0x2, 0x7, 0x10}], 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d80)={&(0x7f0000001a40)='spi_setup\x00', r18, 0x0, 0xf}, 0x18) 26.200221999s ago: executing program 1 (id=7584): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="060000000400000003000000050000", @ANYRES32], 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x5, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80000001, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x800}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x163581, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x17, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5}, {0x7, 0x0, 0x3, 0x0}, {}, {}, {0x16}}], {{0x6, 0x1, 0xb, 0x0}, {0x5}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000cc0)=""/254, 0x26, 0xfe, 0x1, 0x0, 0x0, @void, @value}, 0x28) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r7}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_tracing={0x1a, 0x20, &(0x7f0000000740)=ANY=[@ANYBLOB="180000001a00000000000000040000008520000002000000950000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000018360000020000000000000000000000f9287f000c00000018170000", @ANYRES32=r0, @ANYBLOB="000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70c000500000000b704000000000000850000008200000095000000000000009d9d63c2a42d6b43ec2c381b57de47387f5ecc2bce6c8bf9d06237cc444cdc576e7d639ab76aefcccab589167df59f83490b41bc96b90b86af2e3b58b2"], &(0x7f00000001c0)='GPL\x00', 0x2, 0x56, &(0x7f0000000240)=""/86, 0x41100, 0x28, '\x00', 0x0, 0x1c, r7, 0x8, &(0x7f00000002c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x6, 0xc, 0x3c}, 0x10, 0x90d0, r7, 0x7, &(0x7f0000000540)=[r7, r8, r3, r8, r7, r7], &(0x7f0000000580)=[{0x0, 0x1, 0x4, 0xc}, {0x0, 0x4, 0x0, 0x1}, {0x1, 0x3, 0x1, 0xc}, {0x1, 0x4, 0xc, 0x5}, {0x3, 0x4, 0xb, 0xcd414f7e6c30e25a}, {0x1, 0x4, 0x3, 0xd}, {0x4, 0x1, 0xa, 0x8}], 0x10, 0xfffffffb, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r10}, 0x10) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) 26.197017189s ago: executing program 7 (id=7585): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0, 0x0, 0x0, 0x0, 0xd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2, 0x300}, @printk={@lu, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = syz_clone(0x20800, &(0x7f0000000300)="6e1010f98e115fd4f1b05d1c7fe3fe2bc893edf17599d8a7f34d224b36e55e7d7a94d632a2857707b93d13e5c37c9b8b7fdad1f908a215", 0x37, &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)="082ce04ceb1f97a427f14846c3046591805af4ae7c354b2213175ac8298a5ff09b724edb4b4957ca0f4b8d2693f86a6e3d01b8f833aeb449cbb12498f5a667eab9446734f7988282d83f8233fdd7dfece7655448584478be50b7182cd54f8eef6eb93638012938a08d3c4771bdb4fdfd16a7d43bb4ba7135bc6e30efbd367ad878354d8701bd7a12e3b2edc0382cdc98fe32ffd5e7d46d0da62c") syz_open_procfs$namespace(r3, &(0x7f0000000700)='ns/uts\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x19, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffff0001}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffc00, 0x0, 0x0, 0x0, 0x80000001}]}, &(0x7f0000000140)='syzkaller\x00', 0x5, 0xb4, &(0x7f0000000180)=""/180, 0x40f00, 0x6, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x3, 0x9, 0xfff}, 0x10, 0x0, r0, 0x0, &(0x7f00000002c0)=[r1, 0xffffffffffffffff, r2], 0x0, 0x10, 0x4, @void, @value}, 0x94) 26.196360619s ago: executing program 7 (id=7586): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1}, &(0x7f0000000000), &(0x7f0000000040)='%pi6 \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1, 0x0, 0x3e80}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x146, 0x146, 0x7, [@volatile={0x6}, @struct={0xf, 0x6, 0x0, 0x4, 0x1, 0x9, [{0x8, 0x0, 0x4}, {0xf, 0x3, 0xd}, {0xe, 0x5, 0xc}, {0x6, 0x1, 0x7}, {0xa, 0x0, 0x4}, {0x4, 0x1, 0x4}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x6}}, @struct={0x0, 0x9, 0x0, 0x4, 0x1, 0xff, [{0x1, 0x1, 0x2}, {0x5, 0x2, 0x2}, {0x4, 0x5}, {0x10, 0x5}, {0x1, 0x3, 0x265a15d3}, {0xe, 0x1, 0x5}, {0xa, 0x1, 0x3}, {0x3, 0x4, 0x60000000}, {0x2, 0x5, 0xf}]}, @volatile={0x8, 0x0, 0x0, 0x9, 0x3}, @float={0x10, 0x0, 0x0, 0x10, 0x4}, @struct={0xc, 0x1, 0x0, 0x4, 0x0, 0xe00000, [{0x1, 0x3}]}, @datasec={0xa, 0x2, 0x0, 0xf, 0x2, [{0x2, 0x6, 0xae8d}, {0x2, 0x9, 0x7f}], "884d"}]}, {0x0, [0x2e, 0x61, 0x2e, 0x61, 0x5f]}}, &(0x7f00000001c0)=""/144, 0x167, 0x90, 0x0, 0x8001, 0x0, @void, @value}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={0xffffffffffffffff, 0xe0, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001640)=[0x0], 0x0, 0x4b, &(0x7f0000001680)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000016c0), &(0x7f0000001700), 0x8, 0x69, 0x8, 0x8, &(0x7f0000001740)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000f18120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=@bloom_filter={0x1e, 0xb82, 0xfffffff8, 0x7fffffff, 0x2108, 0x1, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2, 0x2, @void, @value, @void, @value}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x806, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[], 0xfdef) 26.195558619s ago: executing program 2 (id=7587): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0xfe, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000000018100000", @ANYRES32, @ANYBLOB="f0f605748aed0000000000000c00000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000340)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESHEX=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000400)='task_rename\x00', r5, 0x0, 0xc}, 0x18) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8200, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'vxcan1\x00', 0x4000}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000005c0)='task_rename\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r9}, &(0x7f0000000d80), &(0x7f0000000dc0)=r10}, 0x20) 26.156738049s ago: executing program 4 (id=7588): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x749c, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r0, &(0x7f0000000280)="60293317ed888d6ea250cda38b13d93cff5b6c7ec8e300220fb3f1fefa0090cc0a81895be52f7ede770117bc0f92a5fa3de448fe93b99e446ad5a204313a788ed67a2a19ab58ca95167ddec2fca395d529fa0134558fd2ed678d304602dea841ac64f70e85cd5dded2cb5141977d12b7b4820eda85013635c6c929ea7de13ebe9c581730810485d6fbbab5dec4559c94f988348f83f20a1f80ad12860846af2bf15d674ff9d18d28a747e6ee9603e73fcc201460ba80ed1705680215c61cd3d5535ce67b4f0f9cb0e830199110694f8f934938f1", &(0x7f0000000180)=""/184, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz0\x00', 0x1ff) socketpair(0x15, 0x800, 0x4, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 26.156391729s ago: executing program 1 (id=7589): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) 26.155798169s ago: executing program 4 (id=7590): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000040007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x1, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8931, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x17, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x2}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 26.154737819s ago: executing program 1 (id=7591): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000040), &(0x7f0000000080)='%ps \x00'}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000081"], 0x48) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xe) 26.144215249s ago: executing program 6 (id=7592): syz_open_procfs$namespace(0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.numa_stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x47, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x101, 0xffc, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x36}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000b7ebccf582fde76900"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r4, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 26.138915399s ago: executing program 1 (id=7593): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f00000006c0)=ANY=[@ANYRESOCT, @ANYBLOB="b839dc483111d96b0247988d1b929c520aae5a2fbdf2c2dce53b9d886b5f09d670af3c08f2ed02ac9b695f1bf72a7ec42c91c1c14819bb95a33b135b07638cbbf07edd62b582"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async, rerun: 32) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) syz_clone(0x41500, 0x0, 0xd, 0xfffffffffffffffd, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000004080)=@base={0x8, 0x4, 0x4, 0xbf26, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3000000, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) (async, rerun: 64) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 26.073129459s ago: executing program 1 (id=7594): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0xe522}, 0x0, 0xffeffffffffffffe, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1, 0x0, 0x20010000000}, 0x18) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="19000000040000000400006e4b6c24ffff00000010cab4b9ed12d331c4ca7937d8e67a9fba1a0800305af727c7a6553a6644df044aad877bde91ffd277333a814e813061f7578440fd7fdebdd41f734113050c217422b6cc220efd5c012ff0e22a808c58b4f9c5142131dae18fbff4d18ad09b4ee34843761384e5d2222805ff512d35e02d5fe41b", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, &(0x7f00000002c0)='`', &(0x7f0000000000), 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r5, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000800)={r5, &(0x7f0000001000)='J', 0x0}, 0x20) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000080)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe9, &(0x7f0000000240)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x94, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) write$cgroup_int(r7, &(0x7f00000004c0)=0x4, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000940)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0xfffffffd, 0xfffffffffffffeeb, 0x0, 0x40f00, 0x1, '\x00', r10, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe66cdf24ed5bcdf4, r11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x90) 26.072387389s ago: executing program 2 (id=7595): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000a000000080000000100000000000000", @ANYRES32=0x1, @ANYBLOB="000004fc58ddf39ecef800f2b7b11992f7415600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c9341, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$MAP_CREATE(0x1d, &(0x7f0000001c40)=ANY=[@ANYBLOB="001800000010000000000000001515070000000000000086"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x40305839, &(0x7f0000000540)={'macsec0\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x2}, 0x20) 3.494027212s ago: executing program 35 (id=7592): syz_open_procfs$namespace(0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.numa_stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x47, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x101, 0xffc, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x36}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000b7ebccf582fde76900"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r4, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 3.484616172s ago: executing program 36 (id=7594): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0xe522}, 0x0, 0xffeffffffffffffe, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1, 0x0, 0x20010000000}, 0x18) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="19000000040000000400006e4b6c24ffff00000010cab4b9ed12d331c4ca7937d8e67a9fba1a0800305af727c7a6553a6644df044aad877bde91ffd277333a814e813061f7578440fd7fdebdd41f734113050c217422b6cc220efd5c012ff0e22a808c58b4f9c5142131dae18fbff4d18ad09b4ee34843761384e5d2222805ff512d35e02d5fe41b", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, &(0x7f00000002c0)='`', &(0x7f0000000000), 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r5, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000800)={r5, &(0x7f0000001000)='J', 0x0}, 0x20) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000080)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe9, &(0x7f0000000240)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x94, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) write$cgroup_int(r7, &(0x7f00000004c0)=0x4, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000940)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0xfffffffd, 0xfffffffffffffeeb, 0x0, 0x40f00, 0x1, '\x00', r10, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe66cdf24ed5bcdf4, r11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x90) 3.447293332s ago: executing program 37 (id=7595): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000a000000080000000100000000000000", @ANYRES32=0x1, @ANYBLOB="000004fc58ddf39ecef800f2b7b11992f7415600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c9341, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$MAP_CREATE(0x1d, &(0x7f0000001c40)=ANY=[@ANYBLOB="001800000010000000000000001515070000000000000086"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x40305839, &(0x7f0000000540)={'macsec0\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x2}, 0x20) 3.419498552s ago: executing program 38 (id=7586): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1}, &(0x7f0000000000), &(0x7f0000000040)='%pi6 \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1, 0x0, 0x3e80}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x146, 0x146, 0x7, [@volatile={0x6}, @struct={0xf, 0x6, 0x0, 0x4, 0x1, 0x9, [{0x8, 0x0, 0x4}, {0xf, 0x3, 0xd}, {0xe, 0x5, 0xc}, {0x6, 0x1, 0x7}, {0xa, 0x0, 0x4}, {0x4, 0x1, 0x4}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x6}}, @struct={0x0, 0x9, 0x0, 0x4, 0x1, 0xff, [{0x1, 0x1, 0x2}, {0x5, 0x2, 0x2}, {0x4, 0x5}, {0x10, 0x5}, {0x1, 0x3, 0x265a15d3}, {0xe, 0x1, 0x5}, {0xa, 0x1, 0x3}, {0x3, 0x4, 0x60000000}, {0x2, 0x5, 0xf}]}, @volatile={0x8, 0x0, 0x0, 0x9, 0x3}, @float={0x10, 0x0, 0x0, 0x10, 0x4}, @struct={0xc, 0x1, 0x0, 0x4, 0x0, 0xe00000, [{0x1, 0x3}]}, @datasec={0xa, 0x2, 0x0, 0xf, 0x2, [{0x2, 0x6, 0xae8d}, {0x2, 0x9, 0x7f}], "884d"}]}, {0x0, [0x2e, 0x61, 0x2e, 0x61, 0x5f]}}, &(0x7f00000001c0)=""/144, 0x167, 0x90, 0x0, 0x8001, 0x0, @void, @value}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={0xffffffffffffffff, 0xe0, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001640)=[0x0], 0x0, 0x4b, &(0x7f0000001680)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000016c0), &(0x7f0000001700), 0x8, 0x69, 0x8, 0x8, &(0x7f0000001740)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000f18120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=@bloom_filter={0x1e, 0xb82, 0xfffffff8, 0x7fffffff, 0x2108, 0x1, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2, 0x2, @void, @value, @void, @value}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x806, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[], 0xfdef) 3.384389722s ago: executing program 39 (id=7590): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000040007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x1, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8931, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x17, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x2}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.303006813s ago: executing program 9 (id=7597): ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x24}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xa, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x4}, @func={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fcffffff7b8a26ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000001801da6d8be2732500000000002020207b1af8ff00000000bfa10000000000000705000000ffffffb702000008000000b703008000000000000000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_request_inode\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x40c000) write$cgroup_int(r5, &(0x7f0000000100), 0x12) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0xfffffe49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305829, &(0x7f0000000040)) write$cgroup_int(r7, &(0x7f0000000240), 0x1001) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x9, 0x10001, 0xb, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x26, 0x0, 0x7fffffff, &(0x7f0000000300)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r9 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFINDEX(r9, 0x400454da, &(0x7f0000000400)=r8) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) 1.282771833s ago: executing program 5 (id=7600): close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='\x00'], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0xc8, 0x0, 0x0, 0x34, 0x10}, 0x0, 0x7, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="020000000500000000000000b1b2136991356b9472a8f5b30f0e87a5d89476e31edfdd1cc9fb61dd0bef1b3f8fd3522c5c12350aba704e46cd1e237accd6c88e12faab4aca739f91285038549ee2f26769175dc7fe135626e1c9185d78cf941569370d79d4843d062c1524f04808c1e8bc0bd157dc8106dc975843259ccf65c9d3999224c37f4f3c900657aea6bc8d7f249c8fde2b3229060b62b097c24e4f7900", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x10) close(r6) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033300fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000001000000", @ANYRES32, @ANYBLOB="180014000001009110c5dd860700000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r9, &(0x7f0000000000), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x56, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) 1.066815085s ago: executing program 5 (id=7601): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="000000c800000000008d3aa54e00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000040000000400"/28], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x3, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) close(r2) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="61aa000000b4eb8a990002031e7d9800000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000017c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'ipvlan1\x00', 0x3501}) (async) ioctl$TUNSETNOCSUM(r2, 0x8923, 0x20000000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, 0x0, &(0x7f00000002c0)}, 0x20) (rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) (async, rerun: 32) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) (async, rerun: 32) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="005d791beb8952beec019300"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000340)='kfree\x00', r6}, 0x18) (async) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r8, 0x0, 0x20000000}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000500)={r8, 0x0, 0x20000000}, 0x20) 1.038559654s ago: executing program 8 (id=7596): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0202, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff001811", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r2}, 0x10) syz_clone(0x50008000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x50008000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c250000000000202020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a40)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a40)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x40047440, 0x2000000c) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'netdevsim0\x00', 0x20}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="4c3b2c8519f00be500"/19], 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="4c3b2c8519f00be500"/19], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000010700000000000000000000181100008c8bf937f6031d19b1d2d60e88736ba571572660bfe8de2ed1224ede8baf26c85ce048fe92e4ae14d10732b35a48f34f3b75293faf79f193c001cc15cd69c9dc12dedfde61bf08080000000000000059f367885306ac1662c3d60fd4f702373d80fe9bbf4abb6cfcbca7a6e44a4b578b7427bd0bb76ffe413c15a7dda6edfcd38909a81e03fc45f1138dd86ce9b2ef714bb24decaeac40f795f074a24eebae65e8ca8d143faf40470b8f1cb8f70788d2a5611d0f73c61c0300b4c1fabb53cb6aed675f62c96fe667fadf3e46b44bc1893e223f5fd3675d82cd340492f92643df5db835033e0f4982", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) 867.695046ms ago: executing program 9 (id=7602): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) 555.568757ms ago: executing program 5 (id=7603): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000040), &(0x7f0000000080)='%ps \x00'}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000081"], 0x48) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xe) 550.173607ms ago: executing program 9 (id=7604): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000fc0)=@generic={0x0, 0x0, 0x10}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x9, 0x0, 0xc, 0x0, 0x0, 0x200, 0x1240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x677}, 0x10000, 0xfffffffffffffffd, 0x0, 0x8, 0xfffffffffffffffc, 0xffbffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000000000000000d00000000020000000100000f03000000030000000100"], &(0x7f0000000000)=""/163, 0x4f, 0xa3, 0x1, 0x0, 0x0, @void, @value}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_type(r1, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r2, 0x0, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x9, 0x8, 0x4, 0x4009, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x1048c0, 0x0, 0x0, 0x0, 0xffffffffffffbbfe, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) write$cgroup_pid(r3, &(0x7f0000000c40), 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) 458.887178ms ago: executing program 5 (id=7605): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000500)={'macvtap0\x00', 0x52d35ce30131f272}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000000)=""/185) 210.109709ms ago: executing program 3 (id=7598): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000007c0)={&(0x7f0000000400)=@name={0x1e, 0x2, 0x1, {{0x0, 0x2}}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x20000045) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000180)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000940)='tlb_flush\x00', r3}, 0x10) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) 110.074739ms ago: executing program 9 (id=7606): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000d7c900000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000004f7bbe100"/28], 0x50) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d030000000000000000000001050020008000000000aefe0000000003000000000100000002"], &(0x7f0000000340)=""/142, 0x4e, 0xfeaf, 0x1, 0x0, 0x0, @void, @value}, 0x20) perf_event_open(&(0x7f00000014c0)={0x5, 0x80, 0x0, 0xff, 0xff, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x1590, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xa, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000007, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000580), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0xc, 0x0, 0x1, 0xff, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], 0x0, 0x27, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000380), &(0x7f0000000480), 0x8, 0xea, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', r0, @fallback, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffff5, @void, @value}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) 0s ago: executing program 5 (id=7607): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000e7fff2ffffbf00000000000000160000009edcd5c0fa9d5090ef5b2caf9c7c9cc53a6ce4efc916ec17d3abfb078a035e8353799a95bb8b74b1aa4f28d4f696fe318d6b4c3834c8258a4f8999641169b45d6eead099f4e608c625e96cc7565bc55b7b6499c9cabd140fef75a078a10a1010a9eddba4ad26f652219513308685648690e18de425b3cd5a66c707a6d4", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x10, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008500000023000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000ef89a2f7ebc1643cbce6924a2df269408f08869897e24aec0865e5c8620a41858ca0c9f220309622509a5737525e1636e3f7aa16a50f4ce57fef4bd65e6d64271535405c4d4c1476af5948b2c04a96fed54f618236b05141b834172f717ba9893487cb37118b0dcea16beab5077198ac0ce4361e782ace0e2cc1871d8db71f59c1a5fd1ab57ce327e13bd15e7afe68ca4a"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000008e3ce220611935bbd569624ae4f7bc1b47"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000f80)=r2}, 0xffffffffffffffd6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYBLOB="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", @ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00007fbefec8000000000000000100000028e6abe97edae2ed8577bbeb6f4d343ceb0e7986d129c501c72904021eb132df4ddde334d6e0e84930874395ebe2a8089b9d089529856c3e04e032eb5f0e8939040eeb72a9370aa4a2acc0d1af3a76133b1758e677e390f54c040b27c4849b031667aaed40ff4831"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xffffffffffffffff}, 0xa261, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, r6, 0x1) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280)={0x0, r5}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="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"/313], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000440)='erofs_destroy_inode\x00', r7}, 0xfffffffffffffdb3) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0), 0x200002, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) recvmsg$unix(r8, &(0x7f0000000580)={&(0x7f0000000680), 0x6e, &(0x7f0000000400)=[{&(0x7f0000000d40)=""/221, 0xdd}, {&(0x7f0000000780)=""/93, 0x5d}], 0x2, &(0x7f0000000e40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x110}, 0x4000a0e0) mkdirat$cgroup(r9, &(0x7f0000000180)='syz0\x00', 0x1ff) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800), 0x80080, 0x0) ioctl$TUNATTACHFILTER(r10, 0x401054d5, &(0x7f0000000fc0)={0x0, &(0x7f0000000f80)}) kernel console output (not intermixed with test programs): local+0x318/0x9e0 [ 335.780094][T13409] ? inet6_addr_del+0x550/0x550 [ 335.784780][T13409] ? rt6_nh_dump_exceptions+0x650/0x650 [ 335.790163][T13409] ? __kasan_check_write+0x14/0x20 [ 335.795113][T13409] ? fib6_add+0x316a/0x3d20 [ 335.799458][T13409] ? memcpy+0x56/0x70 [ 335.803353][T13409] ? ipv6_generate_eui64+0x7ad/0x1090 [ 335.808560][T13409] addrconf_addr_gen+0x572/0xd00 [ 335.813333][T13409] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 335.818891][T13409] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 335.823749][T13409] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 335.828791][T13409] ? __kasan_check_write+0x14/0x20 [ 335.833730][T13409] ? ip6_route_add+0x102/0x130 [ 335.838331][T13409] ? addrconf_add_dev+0x415/0x610 [ 335.843191][T13409] ? local_bh_enable+0x30/0x30 [ 335.847790][T13409] ? addrconf_permanent_addr+0xb40/0xba0 [ 335.853261][T13409] ? igmpv3_del_delrec+0x740/0x740 [ 335.858208][T13409] ? __kasan_check_read+0x11/0x20 [ 335.863158][T13409] addrconf_dev_config+0x342/0x5a0 [ 335.868101][T13409] ? __kasan_check_write+0x14/0x20 [ 335.873047][T13409] ? init_loopback+0x1c0/0x1c0 [ 335.877646][T13409] ? macsec_notify+0x101/0x4c0 [ 335.882249][T13409] ? addrconf_link_ready+0xfb/0x1e0 [ 335.887282][T13409] addrconf_notify+0x8c5/0xe90 [ 335.891885][T13409] raw_notifier_call_chain+0x8c/0xf0 [ 335.897002][T13409] __dev_notify_flags+0x304/0x610 [ 335.901867][T13409] ? __dev_change_flags+0x6e0/0x6e0 [ 335.906911][T13409] ? __dev_change_flags+0x56c/0x6e0 [ 335.911953][T13409] ? dev_get_flags+0x1e0/0x1e0 [ 335.916535][T13409] ? copy_regset_to_user+0x210/0x210 [ 335.921654][T13409] dev_change_flags+0xf0/0x1a0 [ 335.926262][T13409] dev_ifsioc+0x115/0xae0 [ 335.930416][T13409] ? dev_ioctl+0xb40/0xb40 [ 335.934671][T13409] dev_ioctl+0x526/0xb40 [ 335.938755][T13409] sock_do_ioctl+0x295/0x3a0 [ 335.943174][T13409] ? sock_show_fdinfo+0xa0/0xa0 [ 335.947862][T13409] ? kernel_write+0x3d0/0x3d0 [ 335.952385][T13409] ? selinux_file_ioctl+0x3cc/0x540 [ 335.957411][T13409] sock_ioctl+0x4a6/0x760 [ 335.961579][T13409] ? sock_poll+0x340/0x340 [ 335.965830][T13409] ? security_file_ioctl+0x84/0xb0 [ 335.970777][T13409] ? sock_poll+0x340/0x340 [ 335.975028][T13409] __se_sys_ioctl+0x114/0x190 [ 335.979544][T13409] __x64_sys_ioctl+0x7b/0x90 [ 335.983970][T13409] do_syscall_64+0x34/0x70 [ 335.988240][T13409] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 335.993958][T13409] RIP: 0033:0x7ff4997ed719 [ 335.998207][T13409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.017647][T13409] RSP: 002b:00007ff498445038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 336.025892][T13409] RAX: ffffffffffffffda RBX: 00007ff4999a5058 RCX: 00007ff4997ed719 [ 336.033700][T13409] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 336.041512][T13409] RBP: 00007ff498445090 R08: 0000000000000000 R09: 0000000000000000 [ 336.049324][T13409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 336.057134][T13409] R13: 0000000000000000 R14: 00007ff4999a5058 R15: 00007ffe92a1de38 [ 336.072330][T13413] lo: mtu less than device minimum [ 336.105480][T13418] device xfrm0 entered promiscuous mode [ 336.732048][T13446] device syzkaller0 entered promiscuous mode [ 336.853264][T13456] device veth0_vlan left promiscuous mode [ 336.978982][T13456] device veth0_vlan entered promiscuous mode [ 337.209617][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.223416][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 337.241373][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 337.308395][T13469] device pim6reg1 entered promiscuous mode [ 337.342414][T13469] FAULT_INJECTION: forcing a failure. [ 337.342414][T13469] name failslab, interval 1, probability 0, space 0, times 0 [ 337.365208][T13469] CPU: 0 PID: 13469 Comm: syz.4.3745 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 337.376393][T13469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 337.386283][T13469] Call Trace: [ 337.389422][T13469] dump_stack_lvl+0x1e2/0x24b [ 337.393930][T13469] ? bfq_pos_tree_add_move+0x43b/0x43b [ 337.399222][T13469] ? fib6_clean_all+0x269/0x2c0 [ 337.403907][T13469] ? rt6_sync_up+0x1f0/0x1f0 [ 337.408337][T13469] ? fib6_del+0x1060/0x1060 [ 337.412672][T13469] dump_stack+0x15/0x17 [ 337.416661][T13469] should_fail+0x3c6/0x510 [ 337.420926][T13469] ? __alloc_skb+0x80/0x510 [ 337.425253][T13469] __should_failslab+0xa4/0xe0 [ 337.429993][T13469] should_failslab+0x9/0x20 [ 337.434343][T13469] kmem_cache_alloc+0x3d/0x2e0 [ 337.438920][T13469] __alloc_skb+0x80/0x510 [ 337.443085][T13469] ? rt6_multipath_rebalance+0xa10/0xa10 [ 337.448554][T13469] inet6_ifinfo_notify+0x70/0x110 [ 337.453409][T13469] addrconf_notify+0xa48/0xe90 [ 337.458009][T13469] raw_notifier_call_chain+0x8c/0xf0 [ 337.463131][T13469] __dev_notify_flags+0x304/0x610 [ 337.467987][T13469] ? __dev_change_flags+0x6e0/0x6e0 [ 337.473023][T13469] ? __dev_change_flags+0x56c/0x6e0 [ 337.478081][T13469] ? dev_get_flags+0x1e0/0x1e0 [ 337.482667][T13469] ? selinux_capable+0x2f1/0x430 [ 337.487434][T13469] ? selinux_capset+0xf0/0xf0 [ 337.491945][T13469] dev_change_flags+0xf0/0x1a0 [ 337.496551][T13469] dev_ifsioc+0x115/0xae0 [ 337.500709][T13469] ? dev_ioctl+0xb40/0xb40 [ 337.504964][T13469] ? dev_get_by_name_rcu+0xc5/0xf0 [ 337.509914][T13469] dev_ioctl+0x526/0xb40 [ 337.514001][T13469] sock_do_ioctl+0x295/0x3a0 [ 337.518417][T13469] ? sock_show_fdinfo+0xa0/0xa0 [ 337.523103][T13469] ? kernel_write+0x3d0/0x3d0 [ 337.527629][T13469] ? selinux_file_ioctl+0x3cc/0x540 [ 337.532651][T13469] sock_ioctl+0x4a6/0x760 [ 337.536816][T13469] ? sock_poll+0x340/0x340 [ 337.541072][T13469] ? security_file_ioctl+0x84/0xb0 [ 337.546018][T13469] ? sock_poll+0x340/0x340 [ 337.550291][T13469] __se_sys_ioctl+0x114/0x190 [ 337.554784][T13469] __x64_sys_ioctl+0x7b/0x90 [ 337.559219][T13469] do_syscall_64+0x34/0x70 [ 337.563467][T13469] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 337.569191][T13469] RIP: 0033:0x7ff4997ed719 [ 337.573444][T13469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.592978][T13469] RSP: 002b:00007ff498466038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 337.601219][T13469] RAX: ffffffffffffffda RBX: 00007ff4999a4f80 RCX: 00007ff4997ed719 [ 337.609032][T13469] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 337.616946][T13469] RBP: 00007ff498466090 R08: 0000000000000000 R09: 0000000000000000 [ 337.624740][T13469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 337.632555][T13469] R13: 0000000000000000 R14: 00007ff4999a4f80 R15: 00007ffe92a1de38 [ 337.773151][T13472] device lo entered promiscuous mode [ 337.886677][T13492] cgroup: fork rejected by pids controller in /syz0 [ 338.028490][T13541] syz.1.3756[13541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.028556][T13541] syz.1.3756[13541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.159462][T13557] device veth0_vlan left promiscuous mode [ 339.198557][T13557] device veth0_vlan entered promiscuous mode [ 339.245792][T13581] device pim6reg1 entered promiscuous mode [ 339.251917][T13581] FAULT_INJECTION: forcing a failure. [ 339.251917][T13581] name failslab, interval 1, probability 0, space 0, times 0 [ 339.264385][T13581] CPU: 0 PID: 13581 Comm: syz.4.3763 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 339.275498][T13581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 339.285398][T13581] Call Trace: [ 339.288528][T13581] dump_stack_lvl+0x1e2/0x24b [ 339.293031][T13581] ? panic+0x812/0x812 [ 339.296936][T13581] ? bfq_pos_tree_add_move+0x43b/0x43b [ 339.302236][T13581] ? pcpu_alloc+0xfa0/0x1420 [ 339.306656][T13581] dump_stack+0x15/0x17 [ 339.310647][T13581] should_fail+0x3c6/0x510 [ 339.314903][T13581] ? __alloc_skb+0x80/0x510 [ 339.319245][T13581] __should_failslab+0xa4/0xe0 [ 339.323842][T13581] should_failslab+0x9/0x20 [ 339.328183][T13581] kmem_cache_alloc+0x3d/0x2e0 [ 339.332798][T13581] __alloc_skb+0x80/0x510 [ 339.337036][T13581] ? ip6_route_add+0x27/0x130 [ 339.341554][T13581] ? addrconf_add_linklocal+0x5b5/0x9e0 [ 339.346930][T13581] ? addrconf_dev_config+0x342/0x5a0 [ 339.352050][T13581] ? addrconf_notify+0x8c5/0xe90 [ 339.356831][T13581] inet6_rt_notify+0x2db/0x550 [ 339.361528][T13581] ? __x64_sys_ioctl+0x7b/0x90 [ 339.366124][T13581] ? rt6_nh_dump_exceptions+0x650/0x650 [ 339.371505][T13581] fib6_add+0x233e/0x3d20 [ 339.375680][T13581] ? skb_gro_incr_csum_unnecessary+0x260/0x260 [ 339.381653][T13581] ? ipv6_addr_prefix+0x42/0x180 [ 339.386426][T13581] ? fib6_update_sernum_stub+0x1a0/0x1a0 [ 339.391889][T13581] ? __kasan_check_write+0x14/0x20 [ 339.396836][T13581] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 339.401716][T13581] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 339.406741][T13581] ip6_route_add+0x8a/0x130 [ 339.411078][T13581] addrconf_add_linklocal+0x5b5/0x9e0 [ 339.416283][T13581] ? inet6_addr_del+0x550/0x550 [ 339.420972][T13581] ? memcpy+0x56/0x70 [ 339.424789][T13581] ? ipv6_generate_eui64+0x7ad/0x1090 [ 339.429989][T13581] addrconf_addr_gen+0x572/0xd00 [ 339.434763][T13581] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 339.440324][T13581] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 339.445178][T13581] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 339.450218][T13581] ? __kasan_check_write+0x14/0x20 [ 339.455160][T13581] ? ip6_route_add+0x102/0x130 [ 339.459761][T13581] ? addrconf_add_dev+0x415/0x610 [ 339.464623][T13581] ? local_bh_enable+0x30/0x30 [ 339.469220][T13581] ? addrconf_permanent_addr+0xb40/0xba0 [ 339.474694][T13581] ? igmpv3_del_delrec+0x740/0x740 [ 339.479643][T13581] ? __kasan_check_read+0x11/0x20 [ 339.484496][T13581] addrconf_dev_config+0x342/0x5a0 [ 339.489447][T13581] ? __kasan_check_write+0x14/0x20 [ 339.494389][T13581] ? init_loopback+0x1c0/0x1c0 [ 339.498991][T13581] ? macsec_notify+0x101/0x4c0 [ 339.503590][T13581] ? addrconf_link_ready+0xfb/0x1e0 [ 339.508624][T13581] addrconf_notify+0x8c5/0xe90 [ 339.513229][T13581] raw_notifier_call_chain+0x8c/0xf0 [ 339.518360][T13581] __dev_notify_flags+0x304/0x610 [ 339.523242][T13581] ? __dev_change_flags+0x6e0/0x6e0 [ 339.528238][T13581] ? __dev_change_flags+0x56c/0x6e0 [ 339.533273][T13581] ? dev_get_flags+0x1e0/0x1e0 [ 339.537875][T13581] ? copy_regset_to_user+0x210/0x210 [ 339.542997][T13581] dev_change_flags+0xf0/0x1a0 [ 339.547594][T13581] dev_ifsioc+0x115/0xae0 [ 339.551760][T13581] ? dev_ioctl+0xb40/0xb40 [ 339.556014][T13581] dev_ioctl+0x526/0xb40 [ 339.560093][T13581] sock_do_ioctl+0x295/0x3a0 [ 339.564532][T13581] ? sock_show_fdinfo+0xa0/0xa0 [ 339.569207][T13581] ? kernel_write+0x3d0/0x3d0 [ 339.573723][T13581] ? selinux_file_ioctl+0x3cc/0x540 [ 339.578756][T13581] sock_ioctl+0x4a6/0x760 [ 339.582923][T13581] ? sock_poll+0x340/0x340 [ 339.587187][T13581] ? security_file_ioctl+0x84/0xb0 [ 339.592125][T13581] ? sock_poll+0x340/0x340 [ 339.596462][T13581] __se_sys_ioctl+0x114/0x190 [ 339.600976][T13581] __x64_sys_ioctl+0x7b/0x90 [ 339.605405][T13581] do_syscall_64+0x34/0x70 [ 339.609658][T13581] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 339.615386][T13581] RIP: 0033:0x7ff4997ed719 [ 339.619638][T13581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 339.639077][T13581] RSP: 002b:00007ff498445038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 339.647319][T13581] RAX: ffffffffffffffda RBX: 00007ff4999a5058 RCX: 00007ff4997ed719 [ 339.655131][T13581] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 339.662943][T13581] RBP: 00007ff498445090 R08: 0000000000000000 R09: 0000000000000000 [ 339.670752][T13581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 339.678564][T13581] R13: 0000000000000000 R14: 00007ff4999a5058 R15: 00007ffe92a1de38 [ 339.696250][T13593] device veth0_vlan left promiscuous mode [ 339.702184][T13593] device veth0_vlan entered promiscuous mode [ 339.710623][T13592] device pim6reg1 entered promiscuous mode [ 339.723453][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.734742][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.742358][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 339.990853][T13626] FAULT_INJECTION: forcing a failure. [ 339.990853][T13626] name failslab, interval 1, probability 0, space 0, times 0 [ 340.039397][T13626] CPU: 0 PID: 13626 Comm: syz.1.3776 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 340.050586][T13626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 340.060479][T13626] Call Trace: [ 340.063610][T13626] dump_stack_lvl+0x1e2/0x24b [ 340.068132][T13626] ? bfq_pos_tree_add_move+0x43b/0x43b [ 340.073427][T13626] ? __kasan_check_write+0x14/0x20 [ 340.078366][T13626] dump_stack+0x15/0x17 [ 340.082352][T13626] should_fail+0x3c6/0x510 [ 340.086602][T13626] ? dup_task_struct+0x57/0xc30 [ 340.091290][T13626] __should_failslab+0xa4/0xe0 [ 340.095889][T13626] should_failslab+0x9/0x20 [ 340.100226][T13626] kmem_cache_alloc+0x3d/0x2e0 [ 340.104827][T13626] ? __kasan_check_write+0x14/0x20 [ 340.109775][T13626] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 340.114720][T13626] dup_task_struct+0x57/0xc30 [ 340.119240][T13626] ? __kasan_check_write+0x14/0x20 [ 340.124178][T13626] copy_process+0x5c8/0x3340 [ 340.128621][T13626] ? proc_fail_nth_write+0x20b/0x290 [ 340.133729][T13626] ? proc_fail_nth_read+0x210/0x210 [ 340.138760][T13626] ? security_file_permission+0x86/0xb0 [ 340.144268][T13626] ? rw_verify_area+0x1c3/0x360 [ 340.148955][T13626] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 340.153900][T13626] ? vfs_write+0x852/0xe70 [ 340.158160][T13626] ? kmem_cache_free+0x1c0/0x1e0 [ 340.162929][T13626] kernel_clone+0x21e/0x9e0 [ 340.167268][T13626] ? __kasan_check_write+0x14/0x20 [ 340.172216][T13626] ? create_io_thread+0x1e0/0x1e0 [ 340.177078][T13626] __x64_sys_clone+0x23f/0x290 [ 340.181672][T13626] ? __do_sys_vfork+0x130/0x130 [ 340.186365][T13626] ? debug_smp_processor_id+0x17/0x20 [ 340.191567][T13626] do_syscall_64+0x34/0x70 [ 340.195823][T13626] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 340.201548][T13626] RIP: 0033:0x7fc72092e719 [ 340.205800][T13626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.225256][T13626] RSP: 002b:00007fc71f5a6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 340.233488][T13626] RAX: ffffffffffffffda RBX: 00007fc720ae5f80 RCX: 00007fc72092e719 [ 340.241313][T13626] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 340.249120][T13626] RBP: 00007fc71f5a7090 R08: 0000000000000000 R09: 0000000000000000 [ 340.256923][T13626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 340.264734][T13626] R13: 0000000000000000 R14: 00007fc720ae5f80 R15: 00007ffe76d3ed88 [ 340.326621][T13643] device pim6reg1 entered promiscuous mode [ 340.367075][T13643] FAULT_INJECTION: forcing a failure. [ 340.367075][T13643] name failslab, interval 1, probability 0, space 0, times 0 [ 340.443394][T13643] CPU: 0 PID: 13643 Comm: syz.4.3782 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 340.454584][T13643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 340.464473][T13643] Call Trace: [ 340.467611][T13643] dump_stack_lvl+0x1e2/0x24b [ 340.472106][T13643] ? bfq_pos_tree_add_move+0x43b/0x43b [ 340.477405][T13643] ? fib6_clean_all+0x269/0x2c0 [ 340.482111][T13643] ? rt6_sync_up+0x1f0/0x1f0 [ 340.486515][T13643] ? fib6_del+0x1060/0x1060 [ 340.490857][T13643] dump_stack+0x15/0x17 [ 340.494863][T13643] should_fail+0x3c6/0x510 [ 340.499104][T13643] ? __alloc_skb+0x80/0x510 [ 340.503442][T13643] __should_failslab+0xa4/0xe0 [ 340.508043][T13643] should_failslab+0x9/0x20 [ 340.512383][T13643] kmem_cache_alloc+0x3d/0x2e0 [ 340.516981][T13643] __alloc_skb+0x80/0x510 [ 340.521146][T13643] ? rt6_multipath_rebalance+0xa10/0xa10 [ 340.526619][T13643] inet6_ifinfo_notify+0x70/0x110 [ 340.531479][T13643] addrconf_notify+0xa48/0xe90 [ 340.536088][T13643] raw_notifier_call_chain+0x8c/0xf0 [ 340.541196][T13643] __dev_notify_flags+0x304/0x610 [ 340.546059][T13643] ? __dev_change_flags+0x6e0/0x6e0 [ 340.551351][T13643] ? __dev_change_flags+0x56c/0x6e0 [ 340.556388][T13643] ? dev_get_flags+0x1e0/0x1e0 [ 340.560982][T13643] ? selinux_capable+0x2f1/0x430 [ 340.565758][T13643] ? selinux_capset+0xf0/0xf0 [ 340.570271][T13643] dev_change_flags+0xf0/0x1a0 [ 340.574884][T13643] dev_ifsioc+0x115/0xae0 [ 340.579038][T13643] ? dev_ioctl+0xb40/0xb40 [ 340.583295][T13643] ? dev_get_by_name_rcu+0xc5/0xf0 [ 340.588243][T13643] dev_ioctl+0x526/0xb40 [ 340.592327][T13643] sock_do_ioctl+0x295/0x3a0 [ 340.597180][T13643] ? sock_show_fdinfo+0xa0/0xa0 [ 340.601863][T13643] ? kernel_write+0x3d0/0x3d0 [ 340.606380][T13643] ? selinux_file_ioctl+0x3cc/0x540 [ 340.611413][T13643] sock_ioctl+0x4a6/0x760 [ 340.615596][T13643] ? sock_poll+0x340/0x340 [ 340.619857][T13643] ? security_file_ioctl+0x84/0xb0 [ 340.624781][T13643] ? sock_poll+0x340/0x340 [ 340.629038][T13643] __se_sys_ioctl+0x114/0x190 [ 340.633566][T13643] __x64_sys_ioctl+0x7b/0x90 [ 340.637998][T13643] do_syscall_64+0x34/0x70 [ 340.642450][T13643] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 340.648149][T13643] RIP: 0033:0x7ff4997ed719 [ 340.652402][T13643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.671932][T13643] RSP: 002b:00007ff498466038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 340.680184][T13643] RAX: ffffffffffffffda RBX: 00007ff4999a4f80 RCX: 00007ff4997ed719 [ 340.687982][T13643] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 340.695795][T13643] RBP: 00007ff498466090 R08: 0000000000000000 R09: 0000000000000000 [ 340.703607][T13643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 340.711417][T13643] R13: 0000000000000000 R14: 00007ff4999a4f80 R15: 00007ffe92a1de38 [ 340.971764][T13654] device syzkaller0 entered promiscuous mode [ 341.426727][T13695] device pim6reg1 entered promiscuous mode [ 341.459768][T13697] device pim6reg1 entered promiscuous mode [ 341.498582][T13697] FAULT_INJECTION: forcing a failure. [ 341.498582][T13697] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 341.583362][T13697] CPU: 1 PID: 13697 Comm: syz.1.3795 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 341.594556][T13697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 341.604439][T13697] Call Trace: [ 341.607575][T13697] dump_stack_lvl+0x1e2/0x24b [ 341.612082][T13697] ? bfq_pos_tree_add_move+0x43b/0x43b [ 341.617380][T13697] ? _raw_spin_lock+0xa4/0x1b0 [ 341.621982][T13697] dump_stack+0x15/0x17 [ 341.625969][T13697] should_fail+0x3c6/0x510 [ 341.630221][T13697] should_fail_usercopy+0x1a/0x20 [ 341.635084][T13697] _copy_from_user+0x20/0xd0 [ 341.639533][T13697] kstrtouint_from_user+0xca/0x2a0 [ 341.644457][T13697] ? kstrtol_from_user+0x310/0x310 [ 341.649411][T13697] ? snprintf+0xd6/0x120 [ 341.653493][T13697] ? memset+0x35/0x40 [ 341.657311][T13697] proc_fail_nth_write+0xa6/0x290 [ 341.662169][T13697] ? security_file_permission+0x7b/0xb0 [ 341.667545][T13697] ? proc_fail_nth_read+0x210/0x210 [ 341.672578][T13697] ? security_file_permission+0x86/0xb0 [ 341.677959][T13697] ? rw_verify_area+0x1c3/0x360 [ 341.682661][T13697] ? proc_fail_nth_read+0x210/0x210 [ 341.687685][T13697] vfs_write+0x36a/0xe70 [ 341.691763][T13697] ? kernel_write+0x3d0/0x3d0 [ 341.696302][T13697] ? __kasan_check_write+0x14/0x20 [ 341.701223][T13697] ? mutex_lock+0xa5/0x110 [ 341.705560][T13697] ? mutex_trylock+0xa0/0xa0 [ 341.709985][T13697] ? __fdget_pos+0x2e7/0x3a0 [ 341.714417][T13697] ? ksys_write+0x77/0x2c0 [ 341.718672][T13697] ksys_write+0x199/0x2c0 [ 341.722836][T13697] ? __ia32_sys_read+0x90/0x90 [ 341.727432][T13697] ? debug_smp_processor_id+0x17/0x20 [ 341.732643][T13697] __x64_sys_write+0x7b/0x90 [ 341.737067][T13697] do_syscall_64+0x34/0x70 [ 341.741323][T13697] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 341.747048][T13697] RIP: 0033:0x7fc72092d1ff [ 341.751310][T13697] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 341.770751][T13697] RSP: 002b:00007fc71f5a7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 341.778983][T13697] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc72092d1ff [ 341.786796][T13697] RDX: 0000000000000001 RSI: 00007fc71f5a70a0 RDI: 0000000000000009 [ 341.794606][T13697] RBP: 00007fc71f5a7090 R08: 0000000000000000 R09: 0000000000000000 [ 341.802420][T13697] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 341.810229][T13697] R13: 0000000000000000 R14: 00007fc720ae5f80 R15: 00007ffe76d3ed88 [ 342.259019][T13715] FAULT_INJECTION: forcing a failure. [ 342.259019][T13715] name failslab, interval 1, probability 0, space 0, times 0 [ 342.395025][T13715] CPU: 1 PID: 13715 Comm: syz.4.3799 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 342.406220][T13715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 342.416328][T13715] Call Trace: [ 342.419459][T13715] dump_stack_lvl+0x1e2/0x24b [ 342.423965][T13715] ? panic+0x812/0x812 [ 342.427871][T13715] ? do_syscall_64+0x34/0x70 [ 342.432296][T13715] ? bfq_pos_tree_add_move+0x43b/0x43b [ 342.437588][T13715] dump_stack+0x15/0x17 [ 342.441583][T13715] should_fail+0x3c6/0x510 [ 342.445836][T13715] ? __get_vm_area_node+0x116/0x470 [ 342.450873][T13715] __should_failslab+0xa4/0xe0 [ 342.455471][T13715] should_failslab+0x9/0x20 [ 342.459810][T13715] kmem_cache_alloc_trace+0x3a/0x2e0 [ 342.464935][T13715] __get_vm_area_node+0x116/0x470 [ 342.469794][T13715] __vmalloc_node_range+0xdc/0x7c0 [ 342.474737][T13715] ? copy_process+0x5c8/0x3340 [ 342.479344][T13715] ? kmem_cache_alloc+0x168/0x2e0 [ 342.484197][T13715] ? __kasan_check_write+0x14/0x20 [ 342.489152][T13715] dup_task_struct+0x429/0xc30 [ 342.493747][T13715] ? copy_process+0x5c8/0x3340 [ 342.498348][T13715] copy_process+0x5c8/0x3340 [ 342.502774][T13715] ? proc_fail_nth_write+0x20b/0x290 [ 342.507897][T13715] ? proc_fail_nth_read+0x210/0x210 [ 342.512934][T13715] ? security_file_permission+0x86/0xb0 [ 342.518311][T13715] ? rw_verify_area+0x1c3/0x360 [ 342.523002][T13715] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 342.527942][T13715] ? vfs_write+0x852/0xe70 [ 342.532194][T13715] ? kmem_cache_free+0xa9/0x1e0 [ 342.536910][T13715] kernel_clone+0x21e/0x9e0 [ 342.541226][T13715] ? __kasan_check_write+0x14/0x20 [ 342.546167][T13715] ? create_io_thread+0x1e0/0x1e0 [ 342.551064][T13715] __x64_sys_clone+0x23f/0x290 [ 342.555632][T13715] ? __do_sys_vfork+0x130/0x130 [ 342.560324][T13715] ? debug_smp_processor_id+0x17/0x20 [ 342.565527][T13715] do_syscall_64+0x34/0x70 [ 342.569787][T13715] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 342.575506][T13715] RIP: 0033:0x7ff4997ed719 [ 342.579773][T13715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.599208][T13715] RSP: 002b:00007ff498444fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 342.607444][T13715] RAX: ffffffffffffffda RBX: 00007ff4999a5058 RCX: 00007ff4997ed719 [ 342.615254][T13715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 342.623068][T13715] RBP: 00007ff498445090 R08: 0000000000000000 R09: 0000000000000000 [ 342.630882][T13715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 342.638864][T13715] R13: 0000000000000000 R14: 00007ff4999a5058 R15: 00007ffe92a1de38 [ 343.417392][T13715] syz.4.3799: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 344.144283][T13743] device pim6reg1 entered promiscuous mode [ 344.415275][T13715] CPU: 0 PID: 13715 Comm: syz.4.3799 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 344.426464][T13715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 344.436350][T13715] Call Trace: [ 344.439486][T13715] dump_stack_lvl+0x1e2/0x24b [ 344.443997][T13715] ? wake_up_klogd+0xb8/0xf0 [ 344.448418][T13715] ? bfq_pos_tree_add_move+0x43b/0x43b [ 344.453732][T13715] ? pr_cont_kernfs_name+0xf0/0x100 [ 344.458778][T13715] dump_stack+0x15/0x17 [ 344.462742][T13715] warn_alloc+0x21a/0x390 [ 344.466931][T13715] ? __get_vm_area_node+0x116/0x470 [ 344.471952][T13715] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 344.477325][T13715] ? __get_vm_area_node+0x34b/0x470 [ 344.482369][T13715] __vmalloc_node_range+0x287/0x7c0 [ 344.487393][T13715] ? kmem_cache_alloc+0x168/0x2e0 [ 344.492247][T13715] ? __kasan_check_write+0x14/0x20 [ 344.497196][T13715] dup_task_struct+0x429/0xc30 [ 344.501796][T13715] ? copy_process+0x5c8/0x3340 [ 344.506397][T13715] copy_process+0x5c8/0x3340 [ 344.510823][T13715] ? proc_fail_nth_write+0x20b/0x290 [ 344.515944][T13715] ? proc_fail_nth_read+0x210/0x210 [ 344.520988][T13715] ? security_file_permission+0x86/0xb0 [ 344.526361][T13715] ? rw_verify_area+0x1c3/0x360 [ 344.531047][T13715] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 344.535991][T13715] ? vfs_write+0x852/0xe70 [ 344.540247][T13715] ? kmem_cache_free+0xa9/0x1e0 [ 344.544934][T13715] kernel_clone+0x21e/0x9e0 [ 344.549272][T13715] ? __kasan_check_write+0x14/0x20 [ 344.554219][T13715] ? create_io_thread+0x1e0/0x1e0 [ 344.559084][T13715] __x64_sys_clone+0x23f/0x290 [ 344.563680][T13715] ? __do_sys_vfork+0x130/0x130 [ 344.568371][T13715] ? debug_smp_processor_id+0x17/0x20 [ 344.573574][T13715] do_syscall_64+0x34/0x70 [ 344.577833][T13715] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 344.583555][T13715] RIP: 0033:0x7ff4997ed719 [ 344.587809][T13715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 344.607250][T13715] RSP: 002b:00007ff498444fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 344.615494][T13715] RAX: ffffffffffffffda RBX: 00007ff4999a5058 RCX: 00007ff4997ed719 [ 344.623308][T13715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 344.631117][T13715] RBP: 00007ff498445090 R08: 0000000000000000 R09: 0000000000000000 [ 344.638928][T13715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.646741][T13715] R13: 0000000000000000 R14: 00007ff4999a5058 R15: 00007ffe92a1de38 [ 344.664627][T13715] Mem-Info: [ 344.667871][T13715] active_anon:111 inactive_anon:7850 isolated_anon:0 [ 344.667871][T13715] active_file:23119 inactive_file:3259 isolated_file:0 [ 344.667871][T13715] unevictable:0 dirty:193 writeback:0 [ 344.667871][T13715] slab_reclaimable:8069 slab_unreclaimable:75551 [ 344.667871][T13715] mapped:20894 shmem:234 pagetables:440 bounce:0 [ 344.667871][T13715] free:1573693 free_pcp:1043 free_cma:0 [ 344.709594][T13715] Node 0 active_anon:444kB inactive_anon:31500kB active_file:92476kB inactive_file:13036kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:83676kB dirty:772kB writeback:0kB shmem:936kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:7744kB all_unreclaimable? no [ 344.755132][T13715] DMA32 free:2983352kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984760kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1408kB local_pcp:52kB free_cma:0kB [ 344.788628][T13715] lowmem_reserve[]: 0 3941 3941 [ 344.793344][T13715] Normal free:3311864kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:444kB inactive_anon:31600kB active_file:92476kB inactive_file:13036kB unevictable:0kB writepending:772kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:2056kB bounce:0kB free_pcp:2484kB local_pcp:1212kB free_cma:0kB [ 344.824705][T13715] lowmem_reserve[]: 0 0 0 [ 344.829399][T13715] DMA32: 6*4kB (UM) 4*8kB (M) 4*16kB (M) 8*32kB (UM) 7*64kB (UM) 5*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2983352kB [ 344.845618][T13715] Normal: 824*4kB (UME) 871*8kB (UME) 1021*16kB (UME) 603*32kB (UME) 370*64kB (UME) 164*128kB (UME) 65*256kB (UME) 31*512kB (UM) 18*1024kB (ME) 12*2048kB (M) 768*4096kB (M) = 3311816kB [ 345.005338][T13715] 26611 total pagecache pages [ 345.017598][T13715] 0 pages in swap cache [ 345.029280][T13715] Swap cache stats: add 0, delete 0, find 0/0 [ 345.112571][T13715] Free swap = 124996kB [ 345.184045][T13715] Total swap = 124996kB [ 345.236995][T13715] 2097051 pages RAM [ 345.271802][T13715] 0 pages HighMem/MovableOnly [ 345.309058][T13715] 341897 pages reserved [ 345.339801][T13715] 0 pages cma reserved [ 346.196709][T13810] device sit0 left promiscuous mode [ 348.408535][T13885] : renamed from ipvlan1 [ 348.991609][T13916] device veth1_macvtap left promiscuous mode [ 349.192757][T13916] device macsec0 left promiscuous mode [ 349.333554][T13917] device veth1_macvtap entered promiscuous mode [ 349.355893][T13917] device macsec0 entered promiscuous mode [ 349.574471][T13922] device macsec0 left promiscuous mode [ 350.195468][T13937] tap0: tun_chr_ioctl cmd 1074812117 [ 350.279300][T13948] device vlan1 entered promiscuous mode [ 351.269278][T13986] device pim6reg1 entered promiscuous mode [ 351.400305][T14004] syz.1.3873[14004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.400361][T14004] syz.1.3873[14004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.771748][T14004] device syzkaller0 entered promiscuous mode [ 351.799026][T14014] device pim6reg1 entered promiscuous mode [ 351.950320][T14062] device pim6reg1 entered promiscuous mode [ 352.823883][T14095] device veth0_vlan left promiscuous mode [ 352.829814][T14095] device veth0_vlan entered promiscuous mode [ 352.849260][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 352.860818][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 352.875084][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 352.933629][T14110] device pim6reg1 entered promiscuous mode [ 353.376011][T14119] device veth1_macvtap left promiscuous mode [ 353.458877][T14119] device veth1_macvtap entered promiscuous mode [ 353.465447][T14119] device macsec0 entered promiscuous mode [ 353.780526][T14141] device syzkaller0 entered promiscuous mode [ 353.797288][T14143] device pim6reg1 entered promiscuous mode [ 353.906513][T14148] device pim6reg1 entered promiscuous mode [ 354.295672][T14169] syz.1.3921[14169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.295727][T14169] syz.1.3921[14169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.210075][T14191] device pim6reg1 entered promiscuous mode [ 356.119346][T14216] device veth0_vlan left promiscuous mode [ 356.351326][T14216] device veth0_vlan entered promiscuous mode [ 357.019218][T14243] device pim6reg1 entered promiscuous mode [ 358.471788][T14292] device pim6reg1 entered promiscuous mode [ 359.757761][T14345] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 359.855972][T14345] device syzkaller0 entered promiscuous mode [ 360.077149][T14353] device veth0_to_bond entered promiscuous mode [ 360.086764][T14360] device pim6reg1 entered promiscuous mode [ 360.489351][T14385] device veth0_vlan left promiscuous mode [ 360.529185][T14385] device veth0_vlan entered promiscuous mode [ 360.593076][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 360.608903][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 360.673820][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.504587][T14452] device sit0 entered promiscuous mode [ 362.884850][T14507] syz.1.4016[14507] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.150172][T14560] device veth1_macvtap left promiscuous mode [ 364.462285][T14572] device veth1_macvtap left promiscuous mode [ 364.471698][T14572] device macsec0 left promiscuous mode [ 364.552500][T14574] device veth1_macvtap entered promiscuous mode [ 364.566348][T14574] device macsec0 entered promiscuous mode [ 364.577760][T14575] tun0: tun_chr_ioctl cmd 1074025678 [ 364.585474][T14575] tun0: group set to 0 [ 364.647613][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 364.937493][T14598] device syzkaller0 entered promiscuous mode [ 365.820850][T14614] device veth0_vlan left promiscuous mode [ 366.148294][T14614] device veth0_vlan entered promiscuous mode [ 366.513359][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 366.613818][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 366.835607][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 368.471910][T14659] device wg2 entered promiscuous mode [ 368.547772][T14664] device pim6reg1 entered promiscuous mode [ 369.306633][T14707] device wg2 left promiscuous mode [ 369.437285][T14712] device pim6reg1 entered promiscuous mode [ 369.707901][T14731] device syzkaller0 entered promiscuous mode [ 371.934858][T14823] syz.5.4103[14823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.934913][T14823] syz.5.4103[14823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.985482][T14823] device pim6reg1 entered promiscuous mode [ 372.931463][T14890] device veth1_macvtap left promiscuous mode [ 372.987141][T14890] device macsec0 left promiscuous mode [ 373.704306][T14934] device pim6reg1 entered promiscuous mode [ 374.126043][T14966] device pim6reg1 entered promiscuous mode [ 374.609361][T14990] device pim6reg1 entered promiscuous mode [ 375.237536][T15014] device bridge_slave_1 left promiscuous mode [ 375.243509][T15014] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.251847][T15014] device bridge_slave_0 left promiscuous mode [ 375.257918][T15014] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.522916][T15026] device veth1_macvtap left promiscuous mode [ 375.528896][T15026] device macsec0 left promiscuous mode [ 375.540875][T15029] ªªªªªª: renamed from vlan0 [ 375.661995][T15034] device pim6reg1 entered promiscuous mode [ 376.055464][T15048] device pim6reg1 entered promiscuous mode [ 376.572231][T15084] device pim6reg1 entered promiscuous mode [ 377.555525][T15119] device pim6reg1 entered promiscuous mode [ 377.659481][T15126] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 377.669445][T15140] syz.5.4193[15140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.669502][T15140] syz.5.4193[15140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.698298][T15126] device syzkaller0 entered promiscuous mode [ 377.792855][T15162] syz.1.4199[15162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.792891][T15162] syz.1.4199[15162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 378.852149][T15228] syz.2.4218[15228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 378.864738][T15228] syz.2.4218[15228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.112927][T15233] device syzkaller0 entered promiscuous mode [ 379.140808][T15234] device wg2 left promiscuous mode [ 380.908255][T15303] device syzkaller0 entered promiscuous mode [ 380.953446][T15314] device syzkaller0 entered promiscuous mode [ 381.123561][T15335] device pim6reg1 entered promiscuous mode [ 381.202714][T15341] device macsec0 entered promiscuous mode [ 381.555457][T15342] device veth1_macvtap entered promiscuous mode [ 381.608513][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 381.640750][T15343] device veth1_macvtap left promiscuous mode [ 385.396991][T15420] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.403962][T15420] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.538480][T15486] device pim6reg1 entered promiscuous mode [ 393.641870][T15479] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.705605][T15479] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.745433][T15479] device bridge_slave_0 entered promiscuous mode [ 393.755510][T15479] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.762345][T15479] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.838281][T15479] device bridge_slave_1 entered promiscuous mode [ 394.080218][T15497] syz.2.4294[15497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.468159][T15479] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.486232][T15479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.493318][T15479] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.500222][T15479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.524800][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.532334][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.626587][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 394.638834][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 394.668341][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 394.702923][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 394.713211][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.720075][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.729377][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 394.740315][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 394.746344][T15520] syz.4.4301[15520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.748153][T15520] syz.4.4301[15520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.748627][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.777375][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.844721][T15518] device bridge_slave_1 entered promiscuous mode [ 394.851825][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 394.859837][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 394.889368][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 395.029104][T15526] device pim6reg1 entered promiscuous mode [ 395.038776][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 395.047088][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 395.159915][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 395.255534][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 395.399210][T15479] device veth0_vlan entered promiscuous mode [ 395.411128][T15535] device veth0_vlan left promiscuous mode [ 395.609836][T15535] device veth0_vlan entered promiscuous mode [ 396.101449][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 396.135843][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 396.261226][T15479] device veth1_macvtap entered promiscuous mode [ 396.495117][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 396.502947][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 396.610397][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 396.618751][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 396.626974][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 396.704040][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 396.713331][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 396.722456][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 396.731000][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 396.780626][T15553] device pim6reg1 entered promiscuous mode [ 399.406791][T15596] device pim6reg1 entered promiscuous mode [ 403.215563][T15669] device veth0_vlan left promiscuous mode [ 403.251928][T15669] device veth0_vlan entered promiscuous mode [ 403.275825][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 403.407407][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 403.486041][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 404.550705][T15719] device syzkaller0 entered promiscuous mode [ 404.869476][T15734] device pim6reg1 entered promiscuous mode [ 405.552222][T15772] device wg2 entered promiscuous mode [ 405.618654][T15776] syz.1.4366[15776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.618710][T15776] syz.1.4366[15776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.222733][T15825] syz.1.4380[15825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.249374][T15825] syz.1.4380[15825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.570239][T15867] device pim6reg1 entered promiscuous mode [ 407.142697][T15879] device wg2 entered promiscuous mode [ 407.423711][T15905] device veth1_macvtap left promiscuous mode [ 407.429652][T15905] device macsec0 left promiscuous mode [ 407.533217][T15905] device veth1_macvtap entered promiscuous mode [ 407.539479][T15905] device macsec0 entered promiscuous mode [ 407.742119][T15924] device syzkaller0 entered promiscuous mode [ 408.038326][T15941] device veth1_macvtap left promiscuous mode [ 408.044421][T15941] device macsec0 left promiscuous mode [ 408.240047][T15957] device veth1_macvtap entered promiscuous mode [ 408.247536][T15957] device macsec0 entered promiscuous mode [ 409.156358][T15953] device syzkaller0 entered promiscuous mode [ 409.322526][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 410.694288][T16017] syz.5.4433[16017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.694346][T16017] syz.5.4433[16017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.335218][T16029] Â: renamed from pim6reg1 [ 412.736902][T16081] device pim6reg1 entered promiscuous mode [ 412.746162][T16062] device sit0 entered promiscuous mode [ 413.681115][T16098] device pim6reg1 entered promiscuous mode [ 415.012555][T16137] device pim6reg1 entered promiscuous mode [ 416.603102][T16212] device vxcan1 entered promiscuous mode [ 417.369440][T16219] GPL: port 1(erspan0) entered blocking state [ 417.380567][T16219] GPL: port 1(erspan0) entered disabled state [ 417.387535][T16219] device erspan0 entered promiscuous mode [ 417.409446][T16219] GPL: port 1(erspan0) entered blocking state [ 417.415388][T16219] GPL: port 1(erspan0) entered forwarding state [ 417.636466][T16227] device syzkaller0 entered promiscuous mode [ 417.743416][T16237] device pim6reg1 entered promiscuous mode [ 419.548426][T16296] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.876165][T16314] device syzkaller0 entered promiscuous mode [ 420.159872][T16327] device pim6reg1 entered promiscuous mode [ 421.043685][T16368] device veth1_macvtap entered promiscuous mode [ 421.159587][T16368] device macsec0 entered promiscuous mode [ 421.252900][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 423.689466][T16444] device syzkaller0 entered promiscuous mode [ 425.810643][T16477] device syzkaller0 entered promiscuous mode [ 426.177459][T16511] device syzkaller0 entered promiscuous mode [ 426.644806][T16531] device syzkaller0 entered promiscuous mode [ 426.710427][T16529] device wg2 left promiscuous mode [ 427.147372][T16568] ªªªªªª: renamed from vlan0 [ 427.601267][T16596] device pim6reg1 entered promiscuous mode [ 427.969527][T16638] ªªªªªª: renamed from vlan0 [ 429.434065][T16743] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.441114][T16743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.452085][T16743] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.458974][T16743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.467467][T16743] device bridge0 entered promiscuous mode [ 430.005879][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 430.787047][T16788] syz.4.4645[16788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.787104][T16788] syz.4.4645[16788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.441071][T16809] device syzkaller0 entered promiscuous mode [ 431.796173][T16823] device pim6reg1 entered promiscuous mode [ 432.004746][T16830] device syzkaller0 entered promiscuous mode [ 432.115600][T16826] device veth1_macvtap left promiscuous mode [ 432.125150][T16826] device macsec0 left promiscuous mode [ 432.400369][T16835] device wg0 entered promiscuous mode [ 432.515385][T16850] device pim6reg1 entered promiscuous mode [ 432.641742][T16859] ªªªªªª: renamed from vlan0 [ 433.558964][T16903] device pim6reg1 entered promiscuous mode [ 433.845380][T16907] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 434.045976][T16907] device syzkaller0 entered promiscuous mode [ 436.457742][T16989] device wg2 entered promiscuous mode [ 436.717642][T17031] syz.2.4711[17031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.717697][T17031] syz.2.4711[17031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.904847][T17072] device pim6reg1 entered promiscuous mode [ 438.627915][T17101] device veth0_vlan left promiscuous mode [ 438.721965][T17101] device veth0_vlan entered promiscuous mode [ 438.891336][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 438.921840][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 438.975409][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 439.358977][T17125] device wg2 left promiscuous mode [ 439.661160][T17125] device wg2 entered promiscuous mode [ 440.018649][T17137] bridge0: port 3(gretap0) entered blocking state [ 440.028367][T17137] bridge0: port 3(gretap0) entered disabled state [ 440.036473][T17137] device gretap0 entered promiscuous mode [ 440.234038][T17155] device wg2 left promiscuous mode [ 440.275855][T17172] device syzkaller0 left promiscuous mode [ 440.450834][T17154] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 440.517470][T17154] device syzkaller0 entered promiscuous mode [ 440.611664][T17166] tun0: tun_chr_ioctl cmd 1074025675 [ 440.617317][T17166] tun0: persist enabled [ 442.343815][T17255] device syzkaller0 entered promiscuous mode [ 444.025885][T17326] syz.5.4801[17326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.042888][T17326] syz.5.4801[17326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.123133][T17366] device pim6reg1 entered promiscuous mode [ 445.419291][T17398] device sit0 left promiscuous mode [ 445.459852][T17402] device pim6reg1 entered promiscuous mode [ 445.495337][T17398] device sit0 entered promiscuous mode [ 445.507254][T17402] device sit0 left promiscuous mode [ 445.567157][T17402] device sit0 entered promiscuous mode [ 446.474132][T17436] device pim6reg1 entered promiscuous mode [ 447.037654][T17455] device macsec0 entered promiscuous mode [ 449.448955][T17594] device syzkaller0 left promiscuous mode [ 449.572986][T17605] device syzkaller0 entered promiscuous mode [ 449.659647][T17621] syz.2.4895[17621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.659702][T17621] syz.2.4895[17621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.414083][T17631] device syzkaller0 entered promiscuous mode [ 450.755982][T17644] device pim6reg1 entered promiscuous mode [ 451.155229][T17683] device veth1_macvtap left promiscuous mode [ 451.161108][T17683] device macsec0 left promiscuous mode [ 452.266279][T17706] device veth0_vlan left promiscuous mode [ 452.272112][T17706] device veth0_vlan entered promiscuous mode [ 452.313770][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.330763][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 452.338969][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 452.536156][T17744] device veth0_vlan left promiscuous mode [ 452.543080][T17744] device veth0_vlan entered promiscuous mode [ 452.562330][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.570726][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 452.579065][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 452.827833][T17746] device pim6reg1 entered promiscuous mode [ 455.266001][T17839] syz.5.4959[17839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.266057][T17839] syz.5.4959[17839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.396450][T17850] syz.4.4962[17850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.607072][T17850] syz.4.4962[17850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.745920][T17900] device wg2 left promiscuous mode [ 456.980994][T17899] device wg2 entered promiscuous mode [ 457.104884][T17914] device wg2 left promiscuous mode [ 457.141525][T17915] device wg2 entered promiscuous mode [ 458.702515][T18020] device veth0_vlan left promiscuous mode [ 458.859953][T18020] device veth0_vlan entered promiscuous mode [ 459.010797][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 459.019232][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 459.027054][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 462.573906][T18079] device veth1_macvtap entered promiscuous mode [ 462.602683][T18079] device macsec0 entered promiscuous mode [ 462.708187][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 463.573328][T18145] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 463.762555][T18145] device syzkaller0 entered promiscuous mode [ 464.000092][T18154] device pim6reg1 entered promiscuous mode [ 464.745001][T18205] syz.6.5057[18205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.766082][T18205] syz.6.5057[18205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.228745][T18241] device wg2 left promiscuous mode [ 465.247775][T18241] device wg2 entered promiscuous mode [ 466.147808][T18287] device syzkaller0 entered promiscuous mode [ 466.258595][T18305] device pim6reg1 entered promiscuous mode [ 466.348926][T18317] device sit0 left promiscuous mode [ 466.847937][T18347] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.854887][T18347] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.965382][T18347] device bridge0 left promiscuous mode [ 467.431717][T18355] device syzkaller0 entered promiscuous mode [ 469.684553][ T24] audit: type=1400 audit(1731609400.910:184): avc: denied { attach_queue } for pid=18387 comm="syz.2.5103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 469.832572][T18403] : renamed from ipvlan1 [ 469.926182][T18403] device syzkaller0 entered promiscuous mode [ 470.841585][T18417] device wg2 left promiscuous mode [ 472.196715][T18474] device pim6reg1 entered promiscuous mode [ 473.197321][T18543] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 473.801038][T18563] syz.6.5154[18563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.801105][T18563] syz.6.5154[18563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.666246][T18664] tap0: tun_chr_ioctl cmd 2147767511 [ 477.973837][T18678] device pim6reg1 entered promiscuous mode [ 478.141707][T18680] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.317379][T18684] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.324236][T18684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 478.367032][T18684] device bridge0 entered promiscuous mode [ 478.518798][T18711] device veth0_to_bond entered promiscuous mode [ 478.544607][T18715] device syzkaller0 entered promiscuous mode [ 478.794354][T18725] device veth0_vlan left promiscuous mode [ 478.801218][T18725] device veth0_vlan entered promiscuous mode [ 479.217441][T18779] device lo entered promiscuous mode [ 480.288249][T18812] device syzkaller0 entered promiscuous mode [ 481.358323][T18844] FAULT_INJECTION: forcing a failure. [ 481.358323][T18844] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 481.454991][T18842] device pim6reg1 entered promiscuous mode [ 481.515840][T18844] CPU: 0 PID: 18844 Comm: syz.2.5233 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 481.527031][T18844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 481.536930][T18844] Call Trace: [ 481.540073][T18844] dump_stack_lvl+0x1e2/0x24b [ 481.544572][T18844] ? bfq_pos_tree_add_move+0x43b/0x43b [ 481.549865][T18844] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 481.556280][T18844] ? proc_fail_nth_write+0x20b/0x290 [ 481.561405][T18844] dump_stack+0x15/0x17 [ 481.565389][T18844] should_fail+0x3c6/0x510 [ 481.569649][T18844] should_fail_usercopy+0x1a/0x20 [ 481.574502][T18844] _copy_from_user+0x20/0xd0 [ 481.578931][T18844] sock_do_ioctl+0x20e/0x3a0 [ 481.583354][T18844] ? sock_show_fdinfo+0xa0/0xa0 [ 481.588043][T18844] ? kernel_write+0x3d0/0x3d0 [ 481.592558][T18844] ? selinux_file_ioctl+0x3cc/0x540 [ 481.597596][T18844] sock_ioctl+0x4a6/0x760 [ 481.601755][T18844] ? sock_poll+0x340/0x340 [ 481.606015][T18844] ? security_file_ioctl+0x84/0xb0 [ 481.610956][T18844] ? sock_poll+0x340/0x340 [ 481.615209][T18844] __se_sys_ioctl+0x114/0x190 [ 481.619726][T18844] __x64_sys_ioctl+0x7b/0x90 [ 481.624149][T18844] do_syscall_64+0x34/0x70 [ 481.628404][T18844] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 481.634131][T18844] RIP: 0033:0x7f6421345719 [ 481.638385][T18844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 481.657822][T18844] RSP: 002b:00007f641ffbe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 481.666069][T18844] RAX: ffffffffffffffda RBX: 00007f64214fcf80 RCX: 00007f6421345719 [ 481.673882][T18844] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 000000000000000a [ 481.681691][T18844] RBP: 00007f641ffbe090 R08: 0000000000000000 R09: 0000000000000000 [ 481.689502][T18844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 481.697314][T18844] R13: 0000000000000000 R14: 00007f64214fcf80 R15: 00007fffcd389528 [ 482.196630][T18900] device syzkaller0 entered promiscuous mode [ 484.089932][T18948] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.096925][T18948] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.709710][T19002] device syzkaller0 entered promiscuous mode [ 487.952478][T19022] device pim6reg1 entered promiscuous mode [ 489.549959][T19054] syzkaller0: refused to change device tx_queue_len [ 490.065912][T19061] device syzkaller0 entered promiscuous mode [ 490.241946][T19067] device veth0_vlan left promiscuous mode [ 490.387871][T19067] device veth0_vlan entered promiscuous mode [ 490.456204][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 490.486639][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 490.601514][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 490.868474][T19075] device pim6reg1 entered promiscuous mode [ 491.054260][T19082] device syzkaller0 entered promiscuous mode [ 492.602102][T19133] device wg2 entered promiscuous mode [ 494.337445][T19157] device pim6reg1 entered promiscuous mode [ 494.638633][T19168] device macsec0 left promiscuous mode [ 495.711154][T19218] device pim6reg1 entered promiscuous mode [ 495.761565][T19225] device syzkaller0 entered promiscuous mode [ 496.691922][T19272] device syzkaller0 entered promiscuous mode [ 496.967023][T19280] device pim6reg1 entered promiscuous mode [ 497.102154][T19297] device pim6reg1 entered promiscuous mode [ 497.205059][T19305] device sit0 left promiscuous mode [ 497.253271][T19287] device sit0 entered promiscuous mode [ 500.186644][T19442] device sit0 left promiscuous mode [ 500.247664][T19442] device sit0 entered promiscuous mode [ 500.664870][T19462] bridge0: port 2(bridge_slave_1) entered blocking state [ 500.671758][T19462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 500.678902][T19462] bridge0: port 1(bridge_slave_0) entered blocking state [ 500.685748][T19462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 500.900977][T19462] device bridge0 entered promiscuous mode [ 501.043762][T19468] device syzkaller0 entered promiscuous mode [ 501.262064][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 501.284783][T19479] device sit0 left promiscuous mode [ 501.576014][T19507] device syzkaller0 entered promiscuous mode [ 502.259057][T19533] device syzkaller0 entered promiscuous mode [ 502.427786][T19541] device syzkaller0 entered promiscuous mode [ 502.455915][T19541] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 502.471815][T19541] syzkaller0: Linktype set failed because interface is up [ 502.502313][ T3993] syzkaller0: tun_net_xmit 48 [ 502.541152][T19540] device gretap0 left promiscuous mode [ 502.657184][T19540] bridge0: port 3(gretap0) entered disabled state [ 502.675501][T19540] device bridge_slave_1 left promiscuous mode [ 502.681555][T19540] bridge0: port 2(bridge_slave_1) entered disabled state [ 502.689338][T19540] device bridge_slave_0 left promiscuous mode [ 502.695468][T19540] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.570316][T19585] device syzkaller0 entered promiscuous mode [ 505.264497][T19619] syz.2.5451[19619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 505.266457][T19598] device syzkaller0 entered promiscuous mode [ 505.414032][T19626] syz.6.5455[19626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 505.414090][T19626] syz.6.5455[19626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 505.611673][T19626] device vlan1 entered promiscuous mode [ 509.165858][T19781] device pim6reg1 entered promiscuous mode [ 509.909564][T19813] device veth0_vlan left promiscuous mode [ 509.979858][T19813] device veth0_vlan entered promiscuous mode [ 510.154452][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 510.166183][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 510.184689][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 510.193282][T19826] device veth0_vlan left promiscuous mode [ 510.201431][T19826] device veth0_vlan entered promiscuous mode [ 510.217743][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 510.259389][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 510.328066][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 510.377386][T19837] pim6reg0: tun_chr_ioctl cmd 1074025698 [ 511.076876][T19852] €Â0: renamed from pim6reg1 [ 511.868269][T19881] device sit0 entered promiscuous mode [ 512.643660][T19913] syz.2.5537[19913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 512.643719][T19913] syz.2.5537[19913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 512.656277][T19913] syz.2.5537[19913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 512.667885][T19913] syz.2.5537[19913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 514.098719][T19964] device syzkaller0 entered promiscuous mode [ 514.215344][T19966] device pim6reg1 entered promiscuous mode [ 515.530622][T20019] device veth0_vlan left promiscuous mode [ 515.594401][T20019] device veth0_vlan entered promiscuous mode [ 515.707799][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 515.716691][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 515.726281][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 515.747110][T20043] device pim6reg1 entered promiscuous mode [ 515.886752][T20056] gretap0: refused to change device tx_queue_len [ 516.102976][T20074] device syzkaller0 entered promiscuous mode [ 516.609802][T20112] device pim6reg1 entered promiscuous mode [ 518.365218][T20221] device sit0 left promiscuous mode [ 518.464408][T20221] syz.1.5629[20221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 518.476260][T20221] syz.1.5629[20221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.162433][T20393] device syzkaller0 entered promiscuous mode [ 524.210472][T20400] tap0: tun_chr_ioctl cmd 1074025677 [ 524.215725][T20400] tap0: linktype set to 825 [ 524.236153][T20408] device syzkaller0 entered promiscuous mode [ 524.326983][T20421] syz.1.5685[20421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.327042][T20421] syz.1.5685[20421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 525.028718][T20457] : renamed from ipvlan1 [ 525.957101][T20476] device pim6reg1 entered promiscuous mode [ 526.773126][T20515] device sit0 entered promiscuous mode [ 527.377514][T20517] device wg2 left promiscuous mode [ 528.099785][T20534] Â: renamed from pim6reg1 [ 528.822546][T20555] device pim6reg1 entered promiscuous mode [ 531.160759][T20653] device syzkaller0 entered promiscuous mode [ 531.441022][T20655] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.485464][T20655] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.572125][T20655] device bridge_slave_0 entered promiscuous mode [ 531.635786][T20655] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.642635][T20655] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.663250][T20655] device bridge_slave_1 entered promiscuous mode [ 532.030649][T20683] device veth0_to_hsr entered promiscuous mode [ 532.167977][T20681] device syzkaller0 entered promiscuous mode [ 532.205848][T20689] device sit0 entered promiscuous mode [ 532.444683][T20692] device syzkaller0 entered promiscuous mode [ 532.454530][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 532.463127][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 532.497453][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 532.507303][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 532.515802][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 532.522626][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 532.530619][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 532.541387][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 532.550452][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 532.568197][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 532.575080][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 532.594359][T20655] device veth0_vlan entered promiscuous mode [ 532.602698][T20706] device pim6reg1 entered promiscuous mode [ 532.611263][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 532.620157][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 532.628283][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 532.636318][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 532.644257][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 532.652646][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 532.661575][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 532.669541][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 532.682976][T20655] device veth1_macvtap entered promiscuous mode [ 532.692727][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 532.703873][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 532.711641][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 532.721175][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 532.730670][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 532.755857][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 532.816330][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 532.873931][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 532.925420][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 533.097996][ T95] udevd[95]: worker [19116] terminated by signal 33 (Unknown signal 33) [ 533.108286][ T95] udevd[95]: worker [19116] failed while handling '/devices/virtual/block/loop7' [ 533.358368][ T95] udevd[95]: worker [20732] terminated by signal 33 (Unknown signal 33) [ 533.377264][ T95] udevd[95]: worker [20732] failed while handling '/devices/virtual/block/loop6' [ 533.539518][T20735] syz.6.5770[20735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.539578][T20735] syz.6.5770[20735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 535.026700][T20749] device syzkaller0 entered promiscuous mode [ 535.393218][T20771] device pim6reg1 entered promiscuous mode [ 535.504433][T20776] device syzkaller0 entered promiscuous mode [ 535.520602][T20779] device pim6reg1 entered promiscuous mode [ 536.545684][T20786] device syzkaller0 entered promiscuous mode [ 536.946919][T20815] device syzkaller0 entered promiscuous mode [ 537.143994][T20828] syz.1.5797[20828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 537.144025][T20828] syz.1.5797[20828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 537.242951][T20848] device syzkaller0 entered promiscuous mode [ 537.263753][T20856] device wg2 entered promiscuous mode [ 537.512220][T20869] device wg2 entered promiscuous mode [ 537.545314][T20874] device syzkaller0 entered promiscuous mode [ 537.664604][T20903] device syzkaller0 entered promiscuous mode [ 537.817321][T20923] device syzkaller0 entered promiscuous mode [ 547.569259][T20975] device syzkaller0 entered promiscuous mode [ 547.601425][T20975] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 550.480965][T21038] bridge0: port 1(bridge_slave_0) entered blocking state [ 550.495046][T21038] bridge0: port 1(bridge_slave_0) entered disabled state [ 550.502498][T21038] device bridge_slave_0 entered promiscuous mode [ 550.568709][T21038] bridge0: port 2(bridge_slave_1) entered blocking state [ 550.575641][T21038] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.582921][T21038] device bridge_slave_1 entered promiscuous mode [ 551.009359][T21038] bridge0: port 2(bridge_slave_1) entered blocking state [ 551.016229][T21038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 551.023343][T21038] bridge0: port 1(bridge_slave_0) entered blocking state [ 551.030119][T21038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 551.064616][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 551.072696][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 551.083315][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 551.091484][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 551.169509][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 551.177677][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 551.184527][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 551.193139][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 551.201870][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 551.208743][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 551.323104][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 551.331140][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 551.403994][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 551.498805][T21038] device veth0_vlan entered promiscuous mode [ 551.544617][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 551.587976][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 551.699245][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 551.852088][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 551.933142][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 551.949910][T21038] device veth1_macvtap entered promiscuous mode [ 552.066833][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 552.074560][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 552.084392][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 552.093729][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 552.105508][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 552.201311][T21061] ªªªªªª: renamed from vlan0 [ 552.229896][T21067] syz.7.5860[21067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.229958][T21067] syz.7.5860[21067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.246209][T21065] device syzkaller0 entered promiscuous mode [ 552.624151][T21090] device syzkaller0 entered promiscuous mode [ 552.878951][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 552.892403][ T310] device bridge_slave_0 left promiscuous mode [ 552.907820][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.926739][ T310] device veth0_vlan left promiscuous mode [ 554.798410][T21171] device sit0 left promiscuous mode [ 555.189002][T21209] Â: renamed from pim6reg1 [ 555.944480][T21226] device sit0 entered promiscuous mode [ 555.972062][T21224] bridge0: port 1(bridge_slave_0) entered blocking state [ 556.003226][T21224] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.099624][T21224] device bridge_slave_0 entered promiscuous mode [ 556.232341][T21224] bridge0: port 2(bridge_slave_1) entered blocking state [ 556.370600][T21224] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.405231][T21224] device bridge_slave_1 entered promiscuous mode [ 556.541946][T21248] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 556.550809][T21248] device syzkaller0 entered promiscuous mode [ 556.851320][T21224] bridge0: port 2(bridge_slave_1) entered blocking state [ 556.858212][T21224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 556.865307][T21224] bridge0: port 1(bridge_slave_0) entered blocking state [ 556.872085][T21224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 556.900296][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.910031][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.974735][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 556.982976][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 557.085258][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 557.093994][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 557.102425][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 557.109282][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 557.119427][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 557.129916][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 557.138360][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 557.145221][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 557.152931][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 557.161240][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 557.169490][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 557.179751][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 557.188065][T21259] device macsec0 entered promiscuous mode [ 557.203199][T21224] device veth0_vlan entered promiscuous mode [ 557.324204][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 557.332799][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 557.341547][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 557.349892][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 557.367447][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 557.377200][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 557.387588][T21224] device veth1_macvtap entered promiscuous mode [ 557.463499][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 557.524505][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 557.619184][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 557.650779][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 557.677157][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 557.838498][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 557.860767][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 558.209129][T21315] device sit0 entered promiscuous mode [ 558.277490][ T310] device veth0_vlan left promiscuous mode [ 558.798876][T21328] syz.6.5935[21328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.798933][T21328] syz.6.5935[21328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.817526][T21328] syz.6.5935[21328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.835635][T21328] syz.6.5935[21328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.850403][T21320] bridge0: port 1(bridge_slave_0) entered blocking state [ 558.871150][T21320] bridge0: port 1(bridge_slave_0) entered disabled state [ 558.879410][T21328] syz.6.5935[21328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.879490][T21328] syz.6.5935[21328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.879541][T21320] device bridge_slave_0 entered promiscuous mode [ 558.913705][T21320] bridge0: port 2(bridge_slave_1) entered blocking state [ 558.925109][T21320] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.932937][T21320] device bridge_slave_1 entered promiscuous mode [ 558.944246][T21328] syz.6.5935[21328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.944303][T21328] syz.6.5935[21328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.987963][T21339] device sit0 left promiscuous mode [ 559.018328][T21344] device pim6reg1 entered promiscuous mode [ 559.087959][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 559.110960][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 559.305902][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 559.342741][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 559.374399][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 559.381294][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 559.430222][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 559.453252][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 559.470093][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 559.476992][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 559.527615][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 559.542322][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 559.551396][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 559.620095][T21320] device veth0_vlan entered promiscuous mode [ 559.666619][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 559.684135][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 559.706494][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 559.776141][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 559.814062][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 559.843623][T21320] device veth1_macvtap entered promiscuous mode [ 559.891498][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 559.910803][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 560.578173][ T310] device veth0_vlan left promiscuous mode [ 561.071136][T21419] device veth0_vlan left promiscuous mode [ 561.179414][T21419] device veth0_vlan entered promiscuous mode [ 561.785012][T21441] device sit0 left promiscuous mode [ 561.831824][T21442] device sit0 entered promiscuous mode [ 562.520838][T21454] device veth1_macvtap left promiscuous mode [ 562.533473][T21454] device macsec0 left promiscuous mode [ 562.596052][T21475] device pim6reg1 entered promiscuous mode [ 562.612207][T21475] device syzkaller0 entered promiscuous mode [ 562.814982][T21490] device veth0_vlan left promiscuous mode [ 562.822378][T21490] device veth0_vlan entered promiscuous mode [ 562.838762][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 562.847039][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 562.854565][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 562.995667][T21506] syz.2.5985[21506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 562.995761][T21506] syz.2.5985[21506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 563.935060][T21532] device veth1_macvtap left promiscuous mode [ 563.990458][T21532] device macsec0 entered promiscuous mode [ 564.167446][T21550] device sit0 entered promiscuous mode [ 564.331932][T21548] Â: renamed from pim6reg1 [ 564.823854][T21567] device syzkaller0 entered promiscuous mode [ 565.079037][T21575] bridge0: port 2(bridge_slave_1) entered disabled state [ 565.089042][T21575] bridge0: port 1(bridge_slave_0) entered disabled state [ 565.108664][T21575] device bridge0 left promiscuous mode [ 565.818113][T21621] device veth1_macvtap left promiscuous mode [ 565.981106][T21628] device veth1_macvtap entered promiscuous mode [ 565.987586][T21628] device macsec0 entered promiscuous mode [ 566.111725][T21631] device syzkaller0 entered promiscuous mode [ 566.256280][T21639] bridge0: port 2(bridge_slave_1) entered blocking state [ 566.263811][T21639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 566.274574][T21639] bridge0: port 1(bridge_slave_0) entered blocking state [ 566.281728][T21639] bridge0: port 1(bridge_slave_0) entered forwarding state [ 566.292651][T21649] bpf_get_probe_write_proto: 6 callbacks suppressed [ 566.292661][T21649] syz.1.6023[21649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 566.299581][T21649] syz.1.6023[21649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 566.303721][T21639] device bridge0 entered promiscuous mode [ 566.920259][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 570.534928][T21756] device wg2 entered promiscuous mode [ 571.421822][T21817] device macsec0 left promiscuous mode [ 572.430320][T21854] device syzkaller0 entered promiscuous mode [ 572.655670][T21861] syz.1.6081[21861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 572.655728][T21861] syz.1.6081[21861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 578.915442][T22055] device pim6reg1 entered promiscuous mode [ 579.974281][T22115] device syzkaller0 entered promiscuous mode [ 580.924630][T22161] device wg2 entered promiscuous mode [ 581.020076][T22166] device sit0 entered promiscuous mode [ 581.621059][T22176] device sit0 left promiscuous mode [ 581.703240][T22178] device sit0 entered promiscuous mode [ 581.856638][T22189] device pim6reg1 entered promiscuous mode [ 584.152968][T22249] Â: renamed from pim6reg1 [ 584.349911][T22276] syz.1.6201[22276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 584.349949][T22276] syz.1.6201[22276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 584.425553][T22276] syz.1.6201[22276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 584.491488][T22287] device syzkaller0 entered promiscuous mode [ 584.554452][T22276] syz.1.6201[22276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 584.555286][T22276] syz.1.6201[22276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 584.726159][T22276] syz.1.6201[22276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.120140][T22293] device syzkaller0 entered promiscuous mode [ 585.300129][T22327] device syzkaller0 entered promiscuous mode [ 585.318510][T22330] syz.4.6217[22330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.318566][T22330] syz.4.6217[22330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.331381][T22330] syz.4.6217[22330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.343449][T22330] syz.4.6217[22330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.752695][T22363] -: renamed from syzkaller0 [ 587.414363][T22442] bridge0: port 2(bridge_slave_1) entered disabled state [ 587.421382][T22442] bridge0: port 1(bridge_slave_0) entered disabled state [ 587.678394][ T24] audit: type=1400 audit(1731609518.910:185): avc: denied { ioctl } for pid=22468 comm="syz.4.6258" path="" dev="cgroup2" ino=269 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 588.022751][T22510] cgroup: fork rejected by pids controller in /syz4 [ 588.081276][T22518] device pim6reg1 entered promiscuous mode [ 588.181428][T22515] device syzkaller0 entered promiscuous mode [ 589.231699][T22562] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.249047][T22562] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.269522][T22562] device bridge_slave_0 entered promiscuous mode [ 589.277482][T22562] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.284431][T22562] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.292332][T22562] device bridge_slave_1 entered promiscuous mode [ 589.342507][T22562] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.349397][T22562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 589.356484][T22562] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.363234][T22562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 589.453194][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 589.460705][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.468465][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.486916][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 589.495451][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.502314][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 589.518734][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 589.535695][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.542569][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 589.718886][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 589.815439][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 589.847933][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 589.858673][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 589.923469][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 589.935294][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 589.970491][T22562] device veth0_vlan entered promiscuous mode [ 590.010464][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 590.025248][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 590.049162][T22562] device veth1_macvtap entered promiscuous mode [ 590.067551][T22604] device pim6reg1 entered promiscuous mode [ 590.081287][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 590.091291][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 590.106693][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 590.124627][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 590.142533][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 590.193196][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 590.204784][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 590.222373][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 590.240611][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 590.315411][T22626] Ÿë: port 1(veth0_to_team) entered blocking state [ 590.327706][T22626] Ÿë: port 1(veth0_to_team) entered disabled state [ 590.345309][T22626] device veth0_to_team entered promiscuous mode [ 590.613941][T22666] device syzkaller0 entered promiscuous mode [ 590.736076][ T7] device bridge_slave_1 left promiscuous mode [ 590.742064][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.816124][ T7] device bridge_slave_0 left promiscuous mode [ 590.844982][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 590.879977][ T7] device veth1_macvtap left promiscuous mode [ 591.878434][T22708] device syzkaller0 entered promiscuous mode [ 592.882120][T22754] device pim6reg1 entered promiscuous mode [ 593.142500][ T24] audit: type=1400 audit(1731609524.360:186): avc: denied { create } for pid=22767 comm="syz.6.6342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 594.140384][T22817] bpf_get_probe_write_proto: 28 callbacks suppressed [ 594.140395][T22817] syz.6.6356[22817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.191702][T22823] syz.6.6356[22823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.216855][T22817] syz.6.6356[22817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.337601][T22823] syz.6.6356[22823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.428597][T22817] syz.6.6356[22817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.555242][T22817] syz.6.6356[22817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 595.061251][T22847] device syzkaller0 entered promiscuous mode [ 595.514683][T22864] device pim6reg1 entered promiscuous mode [ 595.970719][T22877] syz.6.6371[22877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 595.970779][T22877] syz.6.6371[22877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 596.027932][T22877] syz.6.6371[22877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 596.049847][T22877] syz.6.6371[22877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 596.442383][T22905] Â: renamed from pim6reg1 [ 597.247023][T22951] cgroup: fork rejected by pids controller in /syz2 [ 597.513174][T22978] bridge0: port 1(bridge_slave_0) entered blocking state [ 597.528768][T22978] bridge0: port 1(bridge_slave_0) entered disabled state [ 597.583149][T22978] device bridge_slave_0 entered promiscuous mode [ 597.606848][T22978] bridge0: port 2(bridge_slave_1) entered blocking state [ 597.613789][T22978] bridge0: port 2(bridge_slave_1) entered disabled state [ 597.620998][T22978] device bridge_slave_1 entered promiscuous mode [ 597.911399][T22978] bridge0: port 2(bridge_slave_1) entered blocking state [ 597.918275][T22978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 597.925401][T22978] bridge0: port 1(bridge_slave_0) entered blocking state [ 597.932142][T22978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 597.986562][T23014] device syzkaller0 entered promiscuous mode [ 598.011618][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 598.020470][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.027964][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 598.060038][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 598.070859][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 598.077737][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 598.085380][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 598.095114][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 598.101936][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 598.140106][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 598.174769][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 598.184167][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 598.197363][T22978] device veth0_vlan entered promiscuous mode [ 598.219579][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 598.230439][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 598.245677][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 598.274562][T22978] device veth1_macvtap entered promiscuous mode [ 598.352566][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 598.385801][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 598.413291][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 598.446031][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 598.455364][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 598.908375][ T7] device bridge_slave_1 left promiscuous mode [ 598.919523][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 598.930598][ T7] device bridge_slave_0 left promiscuous mode [ 598.939768][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.948225][ T7] device veth1_macvtap left promiscuous mode [ 599.157459][T23103] bpf_get_probe_write_proto: 4 callbacks suppressed [ 599.157469][T23103] syz.4.6438[23103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 599.164115][T23103] syz.4.6438[23103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 599.177692][T23103] syz.4.6438[23103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 599.189453][T23103] syz.4.6438[23103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 599.567545][T23133] syz.6.6448[23133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 599.595003][T23133] syz.6.6448[23133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 600.014327][T23136] device syzkaller0 entered promiscuous mode [ 600.410410][T23169] device sit0 entered promiscuous mode [ 601.207425][T23235] syz.2.6473[23235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 601.207483][T23235] syz.2.6473[23235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 601.315945][T23237] syz.2.6473[23237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 601.408254][T23237] syz.2.6473[23237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 601.915330][T23252] device syzkaller0 entered promiscuous mode [ 602.069512][T23263] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.080451][T23263] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.040232][T23292] device wg2 entered promiscuous mode [ 603.875355][T23301] device syzkaller0 entered promiscuous mode [ 604.240511][T23320] bridge0: port 2(bridge_slave_1) entered disabled state [ 604.247532][T23320] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.793297][T23332] device pim6reg1 entered promiscuous mode [ 605.704473][T23360] device veth0_vlan left promiscuous mode [ 605.843797][T23360] device veth0_vlan entered promiscuous mode [ 606.361080][T23377] device pim6reg1 entered promiscuous mode [ 606.735157][T23396] device pim6reg1 entered promiscuous mode [ 609.319120][T23500] device veth0_vlan left promiscuous mode [ 609.436788][T23500] device veth0_vlan entered promiscuous mode [ 609.658303][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 609.695752][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 609.725198][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 610.226633][T23516] bridge0: port 2(bridge_slave_1) entered disabled state [ 610.233597][T23516] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.844847][T23527] device syzkaller0 entered promiscuous mode [ 611.994265][T23569] syz.4.6566[23569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.994321][T23569] syz.4.6566[23569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 613.301405][T23602] device syzkaller0 entered promiscuous mode [ 613.636484][T23625] syz.6.6579[23625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 613.636542][T23625] syz.6.6579[23625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 613.670391][T23617] device pim6reg1 entered promiscuous mode [ 613.715862][T23600] syz.7.6575[23600] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 613.721211][T23600] syz.7.6575[23600] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 614.035224][T23641] device wg2 left promiscuous mode [ 615.612118][T23698] device syzkaller0 entered promiscuous mode [ 615.788452][T23709] device pim6reg1 entered promiscuous mode [ 617.488328][T23777] ªªªªªª: renamed from vlan0 [ 617.828253][T23790] device veth0_vlan left promiscuous mode [ 617.894303][T23790] device veth0_vlan entered promiscuous mode [ 618.024531][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 618.044025][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 618.059105][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 619.918689][T23837] device veth0_vlan left promiscuous mode [ 620.066346][T23837] device veth0_vlan entered promiscuous mode [ 621.512761][T23887] device veth0_vlan left promiscuous mode [ 621.525339][T23887] device veth0_vlan entered promiscuous mode [ 621.607337][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 621.641235][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 621.825560][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 621.893483][T23880] ªªªªªª: renamed from vlan0 [ 623.351913][T23924] device syzkaller0 entered promiscuous mode [ 624.033620][T23956] device syzkaller0 entered promiscuous mode [ 624.225602][T11023] syzkaller0: tun_net_xmit 48 [ 624.465233][T23965] tun0: tun_chr_ioctl cmd 1074025673 [ 624.593144][T23966] tun0: tun_chr_ioctl cmd 1074025676 [ 624.626692][T23966] tun0: owner set to 0 [ 626.889621][T24042] device pim6reg1 entered promiscuous mode [ 627.712021][T24072] syz.7.6706[24072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 627.712079][T24072] syz.7.6706[24072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.158475][T24085] device pim6reg1 entered promiscuous mode [ 628.177412][T24087] syz.1.6711[24087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.177471][T24087] syz.1.6711[24087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.227672][T24079] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.248131][T24079] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.269676][T24079] device bridge0 left promiscuous mode [ 628.359144][T24089] device bridge_slave_1 left promiscuous mode [ 628.366779][T24089] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.375630][T24089] device bridge_slave_0 left promiscuous mode [ 628.381647][T24089] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.672882][T24166] device syzkaller0 entered promiscuous mode [ 630.288396][T24193] device pim6reg1 entered promiscuous mode [ 630.423606][T24192] device sit0 left promiscuous mode [ 630.947377][T24202] €Â0: renamed from pim6reg1 [ 631.189280][T24206] device sit0 entered promiscuous mode [ 632.145346][T24225] bridge0: port 2(bridge_slave_1) entered blocking state [ 632.152196][T24225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 632.159348][T24225] bridge0: port 1(bridge_slave_0) entered blocking state [ 632.166103][T24225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 632.254959][T24225] device bridge0 entered promiscuous mode [ 632.713863][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 633.125337][T24242] device syzkaller0 entered promiscuous mode [ 633.339217][T24250] device syzkaller0 entered promiscuous mode [ 635.072114][T24303] device wg2 entered promiscuous mode [ 635.082386][ T24] audit: type=1400 audit(1731609566.310:187): avc: denied { create } for pid=24298 comm="syz.6.6768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 636.540344][T24368] device sit0 left promiscuous mode [ 636.630251][T24371] device pim6reg1 entered promiscuous mode [ 636.640886][T24372] device sit0 entered promiscuous mode [ 636.980078][T24397] device veth0_vlan left promiscuous mode [ 636.998588][T24397] device veth0_vlan entered promiscuous mode [ 637.019570][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.028174][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 637.036044][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 637.809746][T24454] syz.2.6810[24454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.809838][T24454] syz.2.6810[24454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.466277][T24494] device pim6reg1 entered promiscuous mode [ 639.170126][T24574] device syzkaller0 entered promiscuous mode [ 639.231421][T24584] device syzkaller0 entered promiscuous mode [ 640.617615][T24628] device veth0_vlan left promiscuous mode [ 640.681168][T24628] device veth0_vlan entered promiscuous mode [ 640.790758][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 640.811569][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 640.884610][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 640.921225][T24640] syz.4.6864[24640] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 640.921275][T24640] syz.4.6864[24640] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.578677][T24713] device wg2 left promiscuous mode [ 641.732375][T24714] device wg2 entered promiscuous mode [ 643.411937][T24811] device syzkaller0 entered promiscuous mode [ 643.492053][ T24] audit: type=1400 audit(1731609574.720:188): avc: denied { create } for pid=24819 comm="syz.7.6918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 643.574084][T24822] bridge0: port 2(bridge_slave_1) entered disabled state [ 643.587082][T24822] bridge0: port 1(bridge_slave_0) entered disabled state [ 643.612081][T24822] device bridge0 left promiscuous mode [ 644.749006][T24893] device syzkaller0 entered promiscuous mode [ 644.885618][T24879] device syzkaller0 entered promiscuous mode [ 644.983245][T24898] device veth0_vlan left promiscuous mode [ 645.025738][T24898] device veth0_vlan entered promiscuous mode [ 645.123189][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 645.131551][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 645.147515][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 645.776095][T24929] device syzkaller0 entered promiscuous mode [ 646.994130][T24962] device syzkaller0 entered promiscuous mode [ 648.883161][T25046] Â: renamed from pim6reg1 [ 649.689020][T25066] device pim6reg1 entered promiscuous mode [ 650.024533][T25082] device pim6reg1 entered promiscuous mode [ 650.334568][T25108] device veth0_vlan left promiscuous mode [ 650.468200][T25108] device veth0_vlan entered promiscuous mode [ 650.649620][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 650.662247][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 650.695394][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 650.986341][T25145] bridge0: port 2(bridge_slave_1) entered disabled state [ 650.993330][T25145] bridge0: port 1(bridge_slave_0) entered disabled state [ 651.051259][T25146] device syzkaller0 entered promiscuous mode [ 651.074767][T25144] device pim6reg1 entered promiscuous mode [ 652.133323][T25178] device syzkaller0 entered promiscuous mode [ 653.536271][T25260] device wg2 left promiscuous mode [ 653.691347][T25241] device wg2 entered promiscuous mode [ 653.717261][T25267] syz.6.7034[25267] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 653.717319][T25267] syz.6.7034[25267] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 654.214938][T25293] device pim6reg1 entered promiscuous mode [ 654.521946][T25299] syz.1.7045[25299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 654.522005][T25299] syz.1.7045[25299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.868197][T25339] device syzkaller0 entered promiscuous mode [ 655.941726][T25347] device pim6reg1 entered promiscuous mode [ 656.070568][T25363] device pim6reg1 entered promiscuous mode [ 656.474029][T25376] device syzkaller0 entered promiscuous mode [ 656.502450][T25394] device sit0 left promiscuous mode [ 656.857026][T25440] syz.2.7085[25440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 656.857063][T25440] syz.2.7085[25440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 656.870185][T25439] syz.2.7085[25439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 656.881956][T25439] syz.2.7085[25439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 656.899622][T25432] device pim6reg1 entered promiscuous mode [ 657.178549][T25452] bridge0: port 3(gretap0) entered blocking state [ 657.256506][T25452] bridge0: port 3(gretap0) entered disabled state [ 657.329712][T25452] device gretap0 entered promiscuous mode [ 658.447005][T25526] device syzkaller0 entered promiscuous mode [ 661.243721][T25636] device pim6reg1 entered promiscuous mode [ 661.768133][T25658] device sit0 entered promiscuous mode [ 662.122953][T25661] bridge_slave_0: mtu greater than device maximum [ 662.782541][T25699] device syzkaller0 entered promiscuous mode [ 662.955230][T25708] syz.1.7163[25708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 662.955318][T25708] syz.1.7163[25708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.079676][T25711] device syzkaller0 entered promiscuous mode [ 664.199832][T25744] device syzkaller0 entered promiscuous mode [ 665.173303][T25761] device pim6reg1 entered promiscuous mode [ 665.607660][T25753] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.614591][T25753] bridge0: port 1(bridge_slave_0) entered disabled state [ 665.621786][T25753] device bridge_slave_0 entered promiscuous mode [ 665.628690][T25753] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.635554][T25753] bridge0: port 2(bridge_slave_1) entered disabled state [ 665.642842][T25753] device bridge_slave_1 entered promiscuous mode [ 665.993165][T25753] bridge0: port 2(bridge_slave_1) entered blocking state [ 666.000048][T25753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 666.007138][T25753] bridge0: port 1(bridge_slave_0) entered blocking state [ 666.013900][T25753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 666.373448][T25771] device veth0_vlan left promiscuous mode [ 666.420271][T25771] device veth0_vlan entered promiscuous mode [ 666.535074][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 666.564939][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 666.572995][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 666.615515][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 666.674374][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 666.845497][ T7] GPL: port 1(erspan0) entered disabled state [ 666.852742][ T7] device erspan0 left promiscuous mode [ 666.858089][ T7] GPL: port 1(erspan0) entered disabled state [ 666.892325][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 666.917133][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 666.924436][T25778] device sit0 left promiscuous mode [ 666.989850][T25778] device sit0 entered promiscuous mode [ 667.311717][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 667.321484][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 667.381545][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 667.388421][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 667.555375][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 667.606908][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 667.745231][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 667.752079][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 667.949569][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 668.015177][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 668.023084][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 668.043430][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 668.083064][T25753] device veth0_vlan entered promiscuous mode [ 668.248358][ T7] device veth0_vlan left promiscuous mode [ 668.987763][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 669.031892][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 669.042231][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 669.051988][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 669.155047][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 669.255240][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 669.436876][T25753] device veth1_macvtap entered promiscuous mode [ 669.530870][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 669.592967][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 669.726223][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 669.861963][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 669.964761][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 669.973617][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 669.981991][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 671.132414][T25851] device veth1_macvtap left promiscuous mode [ 671.468416][T25879] device pim6reg1 entered promiscuous mode [ 672.879706][T25943] device pim6reg1 entered promiscuous mode [ 673.827302][T25989] device syzkaller0 entered promiscuous mode [ 673.874965][T25986] device pim6reg1 entered promiscuous mode [ 674.393865][T25999] device veth0_vlan left promiscuous mode [ 674.471291][T25999] device veth0_vlan entered promiscuous mode [ 674.813990][T26009] syz.6.7243[26009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 674.816025][T26009] syz.6.7243[26009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.930659][T26074] device syzkaller0 entered promiscuous mode [ 678.371480][T26092] device syzkaller0 entered promiscuous mode [ 680.186039][T26187] device syzkaller0 entered promiscuous mode [ 680.983780][T26226] device pim6reg1 entered promiscuous mode [ 682.970738][T26314] device syzkaller0 entered promiscuous mode [ 685.360634][T26421] device wg2 entered promiscuous mode [ 685.864122][T26464] device pim6reg1 entered promiscuous mode [ 685.924941][T26462] GPL: port 1(erspan0) entered blocking state [ 685.930964][T26462] GPL: port 1(erspan0) entered disabled state [ 685.938799][T26462] device erspan0 entered promiscuous mode [ 685.954915][T26469] device erspan0 left promiscuous mode [ 685.962254][T26469] GPL: port 1(erspan0) entered disabled state [ 686.401931][T26504] device veth0_to_bond entered promiscuous mode [ 686.820271][T26554] device veth0_to_bond entered promiscuous mode [ 689.014904][T26623] device sit0 left promiscuous mode [ 689.370682][T26627] device sit0 entered promiscuous mode [ 690.085745][T26633] device macsec0 entered promiscuous mode [ 690.817346][T26649] device syzkaller0 entered promiscuous mode [ 691.341751][T26682] device veth1_macvtap left promiscuous mode [ 691.502462][T26682] device syzkaller0 entered promiscuous mode [ 694.533405][T26741] device syzkaller0 entered promiscuous mode [ 694.749774][T26745] device sit0 left promiscuous mode [ 694.987052][T26752] device sit0 entered promiscuous mode [ 695.192138][T26766] device sit0 entered promiscuous mode [ 695.842605][T26791] device syzkaller0 entered promiscuous mode [ 696.448348][T26798] device syzkaller0 entered promiscuous mode [ 697.424292][T26832] device wg2 left promiscuous mode [ 697.498168][T26832] device wg2 entered promiscuous mode [ 700.388218][T26883] device pim6reg1 entered promiscuous mode [ 700.967077][T26903] device veth1_macvtap left promiscuous mode [ 701.319507][T26919] device pim6reg1 entered promiscuous mode [ 701.368243][T26931] device pim6reg1 entered promiscuous mode [ 701.671610][T26967] device syzkaller0 entered promiscuous mode [ 701.741396][T26971] Â: renamed from pim6reg1 [ 702.440833][T26991] device veth0_vlan left promiscuous mode [ 702.447131][T26991] device veth0_vlan entered promiscuous mode [ 704.035521][T27071] device sit0 left promiscuous mode [ 707.425203][T27192] device wg2 left promiscuous mode [ 707.997812][T27235] syz.7.7586[27235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 707.997867][T27235] syz.7.7586[27235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 717.565699][T27262] device syzkaller0 entered promiscuous mode [ 731.219732][T27300] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.227210][T27300] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.234445][T27300] device bridge_slave_0 entered promiscuous mode [ 731.242523][T27300] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.249630][T27300] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.256855][T27300] device bridge_slave_1 entered promiscuous mode [ 731.307264][T27298] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.314102][T27298] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.321564][T27298] device bridge_slave_0 entered promiscuous mode [ 731.330305][T27298] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.337182][T27298] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.344386][T27298] device bridge_slave_1 entered promiscuous mode [ 731.359387][T27297] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.366625][T27297] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.373734][T27297] device bridge_slave_0 entered promiscuous mode [ 731.396672][T27297] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.403513][T27297] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.411256][T27297] device bridge_slave_1 entered promiscuous mode [ 731.430661][T27296] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.437646][T27296] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.445158][T27296] device bridge_slave_0 entered promiscuous mode [ 731.451964][T27296] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.458905][T27296] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.466152][T27296] device bridge_slave_1 entered promiscuous mode [ 731.517195][T27299] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.524024][T27299] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.531439][T27299] device bridge_slave_0 entered promiscuous mode [ 731.576340][T27299] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.583376][T27299] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.590694][T27299] device bridge_slave_1 entered promiscuous mode [ 731.622783][T27296] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.629638][T27296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 731.636730][T27296] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.643505][T27296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 731.685784][T27298] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.692631][T27298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 731.699801][T27298] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.706652][T27298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 731.729539][T27300] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.736405][T27300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 731.743481][T27300] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.750302][T27300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 731.804969][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.812472][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.820145][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.827167][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 731.834582][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.845621][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.852706][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.918714][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 731.959781][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 731.967822][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.974645][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 731.981868][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 731.989831][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.996676][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 732.003803][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 732.012024][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 732.019834][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 732.027041][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 732.035024][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 732.041842][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 732.049042][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 732.056979][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 732.063792][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 732.071025][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 732.078786][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 732.086745][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 732.094653][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 732.101403][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 732.108525][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 732.116449][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 732.123804][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 732.131044][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 732.139173][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 732.147397][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 732.155520][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 732.183407][T27296] device veth0_vlan entered promiscuous mode [ 732.193773][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 732.201446][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 732.211160][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 732.219702][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 732.227791][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 732.234609][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 732.242037][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 732.249872][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 732.257708][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 732.265261][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 732.272419][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 732.290138][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 732.298492][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 732.306720][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 732.313547][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 732.321156][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 732.329004][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 732.341848][T27298] device veth0_vlan entered promiscuous mode [ 732.379220][T27296] device veth1_macvtap entered promiscuous mode [ 732.386518][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 732.394267][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 732.403984][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 732.411980][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 732.420062][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 732.428152][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 732.436213][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 732.443586][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 732.450897][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 732.472660][T27300] device veth0_vlan entered promiscuous mode [ 732.485346][T27300] device veth1_macvtap entered promiscuous mode [ 732.509794][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 732.517980][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 732.526393][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 732.535362][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 732.543036][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 732.565632][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 732.573797][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 732.582802][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 732.591227][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 732.599910][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 732.608293][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 732.616620][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 732.623884][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 732.650320][T27298] device veth1_macvtap entered promiscuous mode [ 732.701936][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 732.712760][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 732.722435][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 732.734104][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 732.742825][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 732.751663][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 732.760088][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 732.768545][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 732.776499][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 732.783729][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 732.791472][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 732.800093][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 732.810096][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 732.816972][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 732.824698][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 732.833304][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 732.841836][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 732.848689][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 732.879393][T27297] device veth0_vlan entered promiscuous mode [ 732.899573][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 732.919956][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 732.972931][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 733.002184][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 733.010366][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 733.018804][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 733.027564][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 733.036466][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 733.044668][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 733.053762][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 733.099539][T27297] device veth1_macvtap entered promiscuous mode [ 733.112923][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 733.122300][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 733.160006][T27299] device veth0_vlan entered promiscuous mode [ 733.246128][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 733.253878][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 733.262624][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 733.271165][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 733.280121][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 733.288796][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 733.485857][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 733.502932][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 733.628022][T27299] device veth1_macvtap entered promiscuous mode [ 733.716264][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 733.805685][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 733.915788][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 734.004338][T27344] macvtap0: tun_chr_ioctl cmd 2148553947 [ 734.076186][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 734.085758][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 734.143463][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 734.184073][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 734.540295][ T343] device gretap0 left promiscuous mode [ 734.545630][ T343] bridge0: port 3(gretap0) entered disabled state [ 734.727320][ T343] device bridge_slave_1 left promiscuous mode [ 734.733234][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.740589][ T343] device bridge_slave_0 left promiscuous mode [ 734.746525][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.754047][ T343] device bridge_slave_1 left promiscuous mode [ 734.760055][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.767364][ T343] device bridge_slave_0 left promiscuous mode [ 734.773277][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.781034][ T343] device bridge_slave_1 left promiscuous mode [ 734.787068][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.794130][ T343] device bridge_slave_0 left promiscuous mode [ 734.800159][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.807787][ T343] device bridge_slave_1 left promiscuous mode [ 734.813676][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.820969][ T343] device bridge_slave_0 left promiscuous mode [ 734.826910][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.834707][ T343] device veth0_vlan left promiscuous mode [ 734.840590][ T343] device veth0_vlan left promiscuous mode [ 734.846304][ T343] device veth1_macvtap left promiscuous mode [ 734.852211][ T343] device veth0_vlan left promiscuous mode [ 737.767653][ T343] device bridge_slave_1 left promiscuous mode [ 737.773582][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.781276][ T343] device bridge_slave_0 left promiscuous mode [ 737.787286][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.794659][ T343] device bridge_slave_1 left promiscuous mode [ 737.800910][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.808104][ T343] device bridge_slave_0 left promiscuous mode [ 737.814001][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.822841][ T343] device bridge_slave_1 left promiscuous mode [ 737.828878][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.836389][ T343] device bridge_slave_0 left promiscuous mode [ 737.842288][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.850184][ T343] device bridge_slave_1 left promiscuous mode [ 737.856152][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.863195][ T343] device bridge_slave_0 left promiscuous mode [ 737.869226][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.876741][ T343] device bridge_slave_1 left promiscuous mode [ 737.882639][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.890097][ T343] device bridge_slave_0 left promiscuous mode [ 737.896121][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.903347][ T343] device veth0_to_team left promiscuous mode [ 737.909253][ T343] Ÿë: port 1(veth0_to_team) entered disabled state [ 737.916278][ T343] device bridge_slave_1 left promiscuous mode [ 737.922167][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.929596][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.937701][ T343] device veth1_macvtap left promiscuous mode [ 737.943499][ T343] device veth0_vlan left promiscuous mode [ 737.949281][ T343] device veth1_macvtap left promiscuous mode [ 737.955234][ T343] device veth0_vlan left promiscuous mode [ 737.960864][ T343] device veth1_macvtap left promiscuous mode [ 737.966644][ T343] device veth0_vlan left promiscuous mode [ 737.972247][ T343] device veth1_macvtap left promiscuous mode [ 737.978133][ T343] device veth0_vlan left promiscuous mode [ 737.983783][ T343] device veth1_macvtap left promiscuous mode [ 737.989706][ T343] device veth0_vlan left promiscuous mode [ 737.995501][ T343] device veth0_vlan left promiscuous mode