last executing test programs: 1m53.739189545s ago: executing program 4 (id=718): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x6}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mlxsw_sp_acl_atcam_entry_add_ctcam_spill\x00', r0, 0x0, 0x1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x6}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mlxsw_sp_acl_atcam_entry_add_ctcam_spill\x00', r0, 0x0, 0x1}, 0x18) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) (async) close(r1) (async) 1m53.658982525s ago: executing program 4 (id=723): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xa, 0x2, 0x42, 0x40, 0xc0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x2, r0}, 0x38) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x0, 0x200008, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x99) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x10001, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080)) 1m53.446219506s ago: executing program 4 (id=724): bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000a636000000007fffffff8500000050000000850000000700000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000020086000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0500000041000000060000000200000041"], 0x48) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x440100, 0x0) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000440)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2}, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r4, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000500d5547fc6c774"], 0x0, 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=[0xffffffffffffffff], 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) (async) recvmsg(r7, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) write$cgroup_subtree(r9, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r9, &(0x7f0000000040)=ANY=[], 0x8) (async) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x18, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1m53.444840047s ago: executing program 4 (id=726): recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1m53.370873907s ago: executing program 4 (id=731): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1], 0x18}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x0, 0x2, 0x1, 0x36}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r2, @ANYRES8, @ANYBLOB="993d76f510"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x54, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4a, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f0000000400), 0x8, 0x71, 0x8, 0x8, &(0x7f00000004c0)}}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0xa, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) sendmsg$tipc(r6, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r6, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000801}, 0x0) 1m53.312211507s ago: executing program 32 (id=732): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYRESOCT=0x0, @ANYBLOB="0517073fb64b91ce9ed3808b85c639416d964c708397001cb85c826659a58ed313fa43ccaa8cb92ef6a0357869835cdddb887e8cc7c0a88ae7a66aac49872cf744580c2c025e90724d899d3ca8307944f29dce64fe8f66f41c7666d874f497fa93380985a2299904b847839870382235e867f9ce3397cb0bd47371ec7d71b314724cfd794b52e1bff19ca98328e415180c90", @ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x81, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r1, 0xe0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6, &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3e, &(0x7f0000000b40)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000b80), &(0x7f0000000bc0), 0x8, 0xf6, 0x8, 0x8, &(0x7f0000000c00)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d80), 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@base={0x12, 0xfffffff8, 0x4, 0x25, 0x10, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x1, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000100b7040000000000008500000033000000850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x2, 0x15, &(0x7f0000000840)=@raw=[@map_fd={0x18, 0x3, 0x1, 0x0, r0}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}], &(0x7f0000000600)='GPL\x00', 0xc385, 0xa6, &(0x7f0000000900)=""/166, 0x41100, 0x41, '\x00', r2, @fallback=0x30, r3, 0x8, &(0x7f0000000dc0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000e00)={0x4, 0x6, 0x5, 0x5}, 0x10, 0xffffffffffffffff, r1, 0x7, &(0x7f0000000ec0)=[r0, r4, r5, r0, r0, r0, r0, r0, r0, r0], &(0x7f0000000f00)=[{0x2, 0x4, 0x4, 0x2}, {0x3, 0x2, 0x7, 0x9}, {0x4, 0x5, 0x1, 0x4}, {0x1, 0x2, 0xa, 0x9}, {0x1, 0x1, 0x2, 0xa}, {0x4, 0x2}, {0x0, 0x3, 0x2, 0x3}], 0x10, 0x3, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001400)={{r6}, 0x0, &(0x7f00000013c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000800)='kfree_skb\x00', r11}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r12}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r13, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) sendmsg$inet(r9, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r9, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) recvmsg(r8, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000006c0)=""/195, 0xc3}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0x640c7000, 0x0, 0x2f, 0x0, 0x0, 0x0) 1m53.265933537s ago: executing program 33 (id=735): r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) r2 = getpid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x408040, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x1, 0x9, 0x7f, 0xff, 0x0, 0x2, 0x14110, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xffffffff, 0x1, @perf_config_ext={0xfffffffffffffffd, 0x7}, 0x200, 0x5, 0x1, 0x4, 0xf7, 0xe0, 0x0, 0x0, 0x81, 0x0, 0x3}, r2, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0xf0, 0x9, 0xb1, 0x6e, 0x0, 0x5, 0x10180, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x3}, 0x2, 0x5, 0x246, 0x4, 0x5, 0x5, 0x4, 0x0, 0x8, 0x0, 0x8}, r2, 0x7, r5, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) openat$cgroup_devices(r6, &(0x7f0000000240)='devices.allow\x00', 0x2, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000280)={r6, r6}, 0xc) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000300)='hugetlb.1GB.max_usage_in_bytes\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r6, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x7e, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_tracing={0x1a, 0x15, &(0x7f0000000340)=@raw=[@ldst={0x0, 0x1, 0x6, 0x6, 0xa, 0x30}, @func, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x8}, @printk={@x}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x800}], &(0x7f0000000400)='GPL\x00', 0x3, 0x33, &(0x7f0000000440)=""/51, 0x41000, 0x50, '\x00', r9, 0x19, r6, 0x8, &(0x7f0000000780)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0x9, 0xa2ae78c3}, 0x10, 0xe, r6, 0x2, 0x0, &(0x7f0000000800)=[{0x2, 0x1, 0xe, 0x2}, {0x5, 0x1, 0x10, 0x8}], 0x10, 0xffff1bdd, @void, @value}, 0x94) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x26, &(0x7f0000000900)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @map_fd={0x18, 0x4, 0x1, 0x0, r6}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb2}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf5}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @call={0x85, 0x0, 0x0, 0x17}, @ldst={0x0, 0x3, 0x3, 0x4, 0x7, 0x20, 0xfffffffffffffffc}, @map_val={0x18, 0x8, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a40)='syzkaller\x00', 0x2, 0x98, &(0x7f0000000a80)=""/152, 0xaa708761f46d6758, 0x20, '\x00', 0x0, @fallback=0xe, r6, 0x8, &(0x7f0000000b40)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000b80)={0x1, 0xb, 0x5, 0xfffffffc}, 0x10, r10, r3, 0x7, 0x0, &(0x7f0000000bc0)=[{0x2, 0x4, 0x0, 0x4}, {0x4, 0x2, 0x4, 0xc}, {0x3, 0x5, 0xd, 0x7}, {0x4, 0x1, 0x8}, {0x2, 0x2, 0x2, 0x5}, {0x3, 0x3, 0xe, 0xb}, {0x1, 0x1, 0x5, 0x9}], 0x10, 0x5, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e00)={@map=r6, 0x1f, 0x0, 0x3, &(0x7f0000000d00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000d80)=[0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000e40)={@map=r6, r11, 0x1885debc718c469, 0x0, 0x0, @void, @value, @void, @void, r13}, 0x20) close(r5) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000e80)={@map=r12, r11, 0x15, 0x30, 0x0, @void, @void, @void, @value=r8, r13}, 0x20) mkdir(&(0x7f0000000ec0)='./file0\x00', 0x132) recvmsg$unix(r12, &(0x7f0000004540)={&(0x7f0000000f00)=@abs, 0x6e, &(0x7f0000004340)=[{&(0x7f0000000f80)=""/130, 0x82}, {&(0x7f0000001040)=""/37, 0x25}, {&(0x7f0000001080)=""/164, 0xa4}, {&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f0000002140)=""/70, 0x46}, {&(0x7f00000021c0)=""/188, 0xbc}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000003280)=""/36, 0x24}, {&(0x7f00000032c0)=""/123, 0x7b}, {&(0x7f0000003340)=""/4096, 0x1000}], 0xa, &(0x7f0000004400)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x130}, 0x1) r18 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004580)={r8}, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000045c0)={r15, r16, 0x0, r18}, 0x10) ioctl$TUNSETDEBUG(r17, 0x400454c9, &(0x7f0000004600)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000004640)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000004680)={r14}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000004700)=@generic={&(0x7f00000046c0)='./file0\x00', 0x0, 0x8}, 0x18) syz_clone(0x1d0c2080, &(0x7f0000004740)="ad5e905787307eca984ef85d7ea1a39a76870074d76ea543b101a22129389b78ba43b03672c46502ce1af9ad06d9d57b061414394b89bcc1ac60c0512c9be102b59c097b1134a987dda3ecb7744e3907c8b1b6b185e6ff880a9fcc438283a0a88919806892e64c82d571907677d853e2011312dbea98fda91cefd985ad6996ddf0", 0x81, &(0x7f0000004800), &(0x7f0000004840), &(0x7f0000004880)="08b2d26fc4c49d68949574e0195cdec7ec4ecf7c267d5629a0380576ca08a497602f00d2df273374489f2274c5547688b0f59c38235d759a48109de763c2dd36e59f040786cc3a48c1a2645846179ca2") 1m53.264408847s ago: executing program 4 (id=736): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fib_table_lookup\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0xb4, 0x4, 0x3, 0x1, 0x1, 0x3, '\x00', 0x0, r0, 0x5, 0x0, 0x3, 0xf, @void, @value, @void, @value}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8932, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) 1m53.214477457s ago: executing program 34 (id=736): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fib_table_lookup\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0xb4, 0x4, 0x3, 0x1, 0x1, 0x3, '\x00', 0x0, r0, 0x5, 0x0, 0x3, 0xf, @void, @value, @void, @value}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8932, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) 54.116892937s ago: executing program 5 (id=1691): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r1}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800"/15], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd63"], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd63"], 0xfdef) write$cgroup_type(r6, &(0x7f0000000040), 0x9) (async) write$cgroup_type(r6, &(0x7f0000000040), 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="05000000010000008e000000c9e7000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000c13e1d61b69a7f05ce670b41389750cca0f4f029524108926385d409ba738d6ae20995bedba8819cc2199e2f8c1b8ad9b78ee346122b694805ae54ed2d6e98036ad796e18561ef63615880f9f1b3c47ac744c6c51adce68bd4e7d9c9a8df5d817d79764a74749a7d3367e1ee08e78f0305e55e32c16ec6b32da6916e81b1f6a5067b5d426940984bfc4bc96daa179b7c805df7"], 0x50) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r7}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x53, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x9f, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x53, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x9f, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001c000000b7030000000000008500000005000000bca900000000000035"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r9, &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0d000000ff7f000000000100ff0f00000000000051309914d8128e07e6ea0000440b0200ccac890abed19ada070006abc46d9417c34277c2456e8620fbc0622faaba6237eb4afd381356efac5051cfbc3232d6389db66c97406e4c647633c3d61e426d1572ff8ee500ecbdbf6ee9062012705ae074d06f8f57c6a286d2543276", @ANYRES32=r7, @ANYBLOB='\t\x00'/20, @ANYRES32=r8, @ANYRES32, @ANYBLOB="04000000030000000500"/28], 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000f5ffffff00f700000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r10}, &(0x7f0000000000), 0x0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r10}, &(0x7f0000000000), 0x0}, 0x20) 53.827080878s ago: executing program 0 (id=1700): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000611018000000000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r0, 0x0, 0x8f, 0x36, &(0x7f00000006c0)="e9206b45a693369537794144b6326d13d0911e68438c55b2a411a44b0e2c39a0591b573eadd43ac11edcb12fffd3453aee60a00640d855b0119308ca701a82d22a606538f308e558d729aaad1196ab42ecb8c12ee7a9b57fbcb760209d3534502e204310b831f0a6c60c79884f6e136d70e2097232c3ba14471c1b8f55a15b853797af52d3898eb5c8469d1ba9f60d", &(0x7f0000000780)=""/54, 0x31, 0x0, 0x30, 0x6b, &(0x7f00000007c0)="b7b972afd5e70bed201a8cc63395cfb0c60658fa16979a65b88765bf81a0e3dbec5a756fd9e5e8d8586ea8b8a2db9ad7", &(0x7f0000000800)="cd19f58177850037847d56c99b73d5d11a506f453780522244319bc30d3d5f1796afccf76b7588ad06cfb086bdba60842ff7192b60e7406fb1e2010771596ac3a4d3afa2e8d5c82b85816bc8d04a2f168b772b84d0723fcee3fc7934b16c86f40014a382d480b88495c5f9", 0x4, 0x0, 0x5}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x8, 0x7, 0x2, 0x2, 0x22, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0x0, @void, @value, @void, @value}, 0x50) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x8, 0x7, 0x2, 0x2, 0x22, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={&(0x7f0000000040)="5beac97e1aea623cbda218fedf0dd896570afd4955767103ddda90b02da12ae77a74ea9fdc0da75e803957fbe9d76ba0ab2cc8ca8984218c69d7ab2857e4dcfa20e4f6cad184feca39f614c07c1edf48623334ab58cb177c2f1356949e1a56f0245e6a16983fcafff0fe7f0f24ef9364eb91c8be3e687215f82794209aca3130cdea9b9047e4b735723680ef9adee96193e3f9d140572774bcf7e9b4a4f1c5ee0deb2da07f74bd32826690fb68", &(0x7f00000004c0)=""/254, &(0x7f00000005c0)="610345a4a08c53ef51dd7477c265f9ba2479e26b908bb43cdc3379325274171148304667543622b1bfb7e2fd40df1256e1cec90d97d05c7ba86266a2763620b8c8698385f14ad6905609ea60590918b43e53d68a56a6c78fa0c73ae5d4da0328b82979d6c08a37cd58d4f482391294be58503cff593d94c32e99df78a3761e8f23f8f5d63f1e3e23e162889ad8d4f479ed0d61bf0dbfea8f64a48c446f51d823c371fe047cc3b34ff2fbaee2e36257b0c96652d23603589ccfef9a57b575c55be66187d89ed1aec4392b0b96c0f0f6a462882816e50c38c9b8583a304a29783f3333256cd0f7b80c308f", &(0x7f0000000100)="ad5d1a66ab3ee434c687f03a4a6b61d82c98b994bf8fc5c9c68ef6b963a8ddf86e4d1b5d2c2e2abff40f1cee417e07fd705dd835d591c15e4ec02b27", 0x8, r1}, 0x38) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000280), 0x9) r5 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) (async) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 53.724090669s ago: executing program 0 (id=1702): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48091}, 0x8811) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$TUNGETFEATURES(r4, 0x5452, &(0x7f00000013c0)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0b00000005f8ffff01000100f8ffffffffffffff1f0d114bff8f36a166d58a348dda3225f5540b31b9c3288fd5ea076065081209e7670587c05a3335d01e040000007bcf55cc6cab9fc6b4dbda3a8d0b9e9fb2347b956c288e6d8072c7cdf8e1c2563b441528f6ae2b6568de1d0cd0cd9928af0fe8dacbffd18c26afb14d7b2b519e311be7535d5f47ea873398688936b9c614138bbc7eb01d2e3b0de276d9da55d5758cf460ac17a51edc39ed5157a5deb5fa676700d40a58d1b110ca8450107e", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={&(0x7f0000000600)=""/3, 0x3, 0x0, &(0x7f0000000640)=""/221, 0xdd}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYRESHEX=r5], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r6, 0x4) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 53.536065689s ago: executing program 0 (id=1704): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r4, &(0x7f0000000500)=ANY=[@ANYBLOB='-', @ANYRESHEX, @ANYRESDEC], 0x33) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x2800000}, 0x2c) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) sendmsg$inet(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)="61b030ac379b6112abce73a99c451e9e25ca1b9dc1c9f744d3f45adf315fe61cb5ea082897cf7eaa88665779d6642786d2d4e0832e0762f76a23b5fe1097d35c7d93b11bf07b2b76a61f42180869b80003ea2d9fa16427d0d476db7c701f3429b95e949c298535cf3373e40e1953366c0d7f3cc880b415373ec8b1c6a0441904feee8c95ac", 0x85}, {&(0x7f0000000600)="8fa317daecc8bb5470422a8da7321f75dcb3d3d7f3efa314f109b177c2011989abb68ba57d7b0ea9218ac30a53cbd239fbef325243c0a9e33ef91cee3c7c6af7357d874b39bd607bc11d511865af8be99ad354cb8d074867d2", 0x59}, {&(0x7f0000000400)="b379eea1ac000625a1c5140d6f21ded7dc70b15c0256a7b9c27a676c7de323d423612768dd563333", 0x28}, {&(0x7f0000000680)="bf23d003165e28c2260631b1dc25820043dcac50880d5ee981e7d366abdfbd9e77488456776bfed1d183474e6c2de74b01c6820c09670490cfe69bd28a6b07de6291941eb5189c30b369dbdbcef129d9c688f729ef776584520f4edc57d53970add7aa5a12f33273f2293dac0e305bcddef273fe86dc7bc90a6b0bcf4459cfc5756e11d27263ece22888e5", 0x8b}, {&(0x7f0000000740)="97628dd0ffff5c75f30dd8720c961824932ae65fa947ddd3e805f6dba366895292c1607dfb87e12cb38ad35fcc78157e59164df20b3317b8da700b10158d6e7475f2fb25412050ebecaca7608bba499bda2249fabe36858783094b23c496d9121bad183d7c446275293a8738109dc0839e15cb9b00d75fe82bc0f76c39b6213888995579aa6e6fb0cc9551312e2f80ad223e8f0d6c382326129aca12303d3f49d978fd1017fd3919f5dec558e3354c4a79a3a36c99b7172bab7f5c1b8c689812a18c3f12", 0xc4}, {&(0x7f0000000840)="517aaedc81dc85781410c7ff91a395ebb86fa95746692d0eb7bc552598e0d2f2e271ddfc5980b7827357e19fb3d3f62c8d3e72332d2009e0dc2d2c43081f2cc3ee8e638948cafdceb97c976677fd9fa1c19dc4e14e4e", 0x56}, {&(0x7f00000004c0)="59bce344f346706209b7386ac0b280dc89ffcfe0bac3079641ebc89c1093195a975e143c7fa1df731f3400af28f07a362fca623d50cec7", 0x37}], 0x7}, 0x24040186) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYRES32=r5, @ANYRESOCT, @ANYRESOCT=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x9, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r9}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r10, &(0x7f0000000200), 0x43451) 53.43619672s ago: executing program 0 (id=1706): r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x7}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000400)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0], 0x0, 0x58, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000540), 0x0, 0x0, 0xd4, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) socketpair(0x18, 0x80000, 0x80000000, &(0x7f0000000180)) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xb, [@var={0xe, 0x0, 0x0, 0xe, 0x4, 0x2}]}, {0x0, [0x30, 0x30, 0x2e, 0x61, 0x1, 0x61, 0x5f, 0x5f, 0x5f]}}, &(0x7f0000000780)=""/107, 0x33, 0x6b, 0x0, 0x7, 0x10000, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x8, &(0x7f0000000a40)=ANY=[@ANYBLOB="1853000010000000000e00000000000900040000000450500ac7d042db93220c000600000018c1346c3900000040000d00000000000000000000000000080000e67d3f0938c774f5c5bbce4b1ab13d01db89a3d8ff0939171fac9275e6a8bd4030a4f905492cf4c3277de0"], &(0x7f0000000040)='GPL\x00', 0x6de4, 0x0, 0x0, 0x41100, 0x40, '\x00', r2, 0x25, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000840)={0x4, 0x0, 0x5, 0x3ff}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000880)=[{0x5, 0x2002, 0x5, 0x4}, {0x2, 0x1, 0x6, 0x6}], 0x10, 0xfffffbff, @void, @value}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) write$cgroup_int(r4, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000004000000040000040a0000000000009e", @ANYRES32=r0, @ANYBLOB="0100"/20, @ANYRES32=r2, @ANYRES32=r4, @ANYBLOB="03000000050000000400"/28], 0x50) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000080), 0x12) 53.194177012s ago: executing program 5 (id=1708): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="ffdfdf863dd9ef55418c53594d740aa1254341c589934902f6c15732018424830aec1a75ed44a00b3aa0b603a1"], 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f0000000040)=r4, 0x4) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f0000000100)=r3, 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000006e0000006e00000004000000060000000600000f0200000003000000060000000101000001000000020000000000000005000000070000000600730001000000f3ffffff080000000400090009000000050000000200000008000000080000003a60020000000000000b050000000200000000000002030000000000005f0000"], &(0x7f0000000780)=""/242, 0x8c, 0xf2, 0x1, 0xcfc, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@bloom_filter={0x1e, 0x800, 0xda, 0x3, 0xd220, r0, 0xcc, '\x00', r1, 0xffffffffffffffff, 0x0, 0x4, 0x4, 0xc, @value=r6, @void, @void, @value}, 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r7}, &(0x7f0000000000), &(0x7f00000005c0)=r8}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r10, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) unlink(0x0) close(r11) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r12, 0x8982, 0x20000500) 52.845808593s ago: executing program 7 (id=1715): bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000080), 0x200}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x3}, 0x38) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) (async) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) r4 = bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r1}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x20005, 0xf, 0x4, 0x10885, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value=r4}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32514, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) close(0xffffffffffffffff) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x11, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.empty_time\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r7}, 0x8) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, 0x0) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1f, 0x4, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x58}, [@call={0x85, 0x0, 0x0, 0x2}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) close(r8) 52.805049643s ago: executing program 7 (id=1716): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b00000007000000010001000700000001000000", @ANYRES32, @ANYBLOB="00000000b947db5f5f2ac41f000000000000000084f13366abbb23c5a55e93cc628b67637bd0281b7457a5763ccd37d71e7c41084bb3b1ca178fdb6cce1eb2d7208d5d69ed27e254c87a3178e3b47b585de93d285fd83d06a7adc19cd79c426e0bd2b33d34829742ee470c99d213eb72134139a50871226ee577b857687ec73bf7366233f1dd432188a16d3c351ce48c95215d5b", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='fsi_master_gpio_break\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008400000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000280)='f2fs_bmap\x00', r2, 0x0, 0x9}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x4, 0x9d, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000540), &(0x7f0000000540)=""/167}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000080)={r3, &(0x7f0000000080), 0x0}, 0x20) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x200000000000013a, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000c30a45a69f7e7114e19b937fb4da5beae9fd1ab9bfb53c551bc4185f86b25c4548a829", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) getpid() r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1201, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) write$cgroup_pid(r6, &(0x7f00000001c0), 0xffbf) write$cgroup_pid(r6, &(0x7f0000000140), 0x12) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{r4}, &(0x7f0000000740), &(0x7f0000000780)='%pI4 \x00'}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000480)='ns/net\x00') perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) 52.456040115s ago: executing program 7 (id=1718): socketpair(0x1, 0x3, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f00000001c0), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1952], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r3}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x0, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) 52.316228196s ago: executing program 5 (id=1722): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x4, 0x8, 0x8, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd63"], 0xfdef) 52.314125576s ago: executing program 7 (id=1724): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000240b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='signal_deliver\x00', r1}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f00000001c0)={r3, &(0x7f00000000c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4b07}, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r1, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x98, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xce, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup.net/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x1b, 0x4, 0x401, 0x7, 0x10030, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x0, @void, @value, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001840)={0x18, 0x14, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, @func={0x85, 0x0, 0x1, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='syzkaller\x00', 0xe, 0x1000, &(0x7f0000000840)=""/4096, 0x41100, 0xc, '\x00', r4, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x2, 0x0, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[r0, r0, r0, r2, r7, r0, r0, r0, r0, r0], 0x0, 0x10, 0x9, @void, @value}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 52.264171916s ago: executing program 5 (id=1725): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000000500000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="b764c7e013", @ANYBLOB="000000000000000000000000000000000000000000000000c25b663b"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r0}, 0x8) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x4000084) recvmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000500)=""/92, 0x5c}], 0x1}, 0x0) 52.241995876s ago: executing program 6 (id=1730): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000c40)={r1, &(0x7f0000000b80), 0x0}, 0x20) sendmsg$tipc(r0, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f00000012c0)=ANY=[@ANYBLOB="1000000004000000040000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="0055c3000000000000000000000000c703c2acdcd89803a414ffbb8cc8eeb15f7e37e1c526072ba02155f33cb652b0a814725e06c50e2d0a80d31767dcefa176c4eee8ae5a0ed65a8b09fe9b6094"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc786b409ac930c90ff90f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d858952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09e3187a10d905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367638cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a2d4f12e8e717eaaa2a6d14fee0c15f36c203dbc7c06128bec84231d43e152ef19ce027436fb4ebb9fce431b913f4817597a6f53d1626f9d1cb7b36fb18ac19547a8b20ede70c81a75686cea85dcd34408128da7cab045541bc6b9a0a79f63f2e7646356e04b977c9f47467537015240b974184be9c54b7c628ae4d97ebdb06070344468994afbaac71e5ffac2c61d9af66f9de2760a38e968a781528531c1c936a02065be48f1eee77be878873206d65bd0b1241fab9139abd7f40febe81fed3684e6b59273da01f1743c6a5df300ec59c65e8174fc2d95a62ca7b937289ad14107333007eab833a5849eb19f18ae41743dfb949377e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8931, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = openat$tun(0xffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, 0x0) openat$tun(0xffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x5, 0x17, &(0x7f0000001380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8932, &(0x7f0000000080)) 51.42003439s ago: executing program 5 (id=1738): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x5, 0x2, 0x1, 0x9, 0x0, 0x2b9, 0x130, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000f80), 0xa}, 0x2420, 0x87, 0x7fffffff, 0x5, 0xfffffffffffffff9, 0x6, 0x1, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x4, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001040)=ANY=[@ANYBLOB="0300"/20]) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3ea, 0xd}, 0x100800, 0x0, 0xfffffffe, 0x3, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r3, 0x0, 0x0, 0x4}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='signal_deliver\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000740), 0x10075, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$LINK_DETACH(0x22, &(0x7f0000000f40), 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xc, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000002c0)='veth0_vlan\x00') bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001080)) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, 0xffffffffffffffff) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 51.41813938s ago: executing program 7 (id=1739): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0xe, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000140)=@tipc=@id, 0x80, &(0x7f00000001c0)=[{&(0x7f00000002c0)=""/139, 0x8b}, {&(0x7f0000000380)=""/66, 0x42}], 0x2, &(0x7f0000000400)=""/126, 0x7e}, 0x10100) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1e031800dd5c980128854d4a"], 0xffdd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63fc80fc020c2f00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa3a2008"], 0xfdef) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r6}, 0x8) 51.338949581s ago: executing program 6 (id=1740): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x4, [@func={0x2, 0x0, 0x0, 0xc, 0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2, 0x1}]}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r2}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x58, &(0x7f0000000280)}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r2, 0x20, &(0x7f00000003c0)={&(0x7f00000007c0)=""/144, 0x90, 0x0, &(0x7f0000000880)=""/145, 0x91}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000000000000791048000000000071003d00000000009500000000000000db74589d4b38cc306ac390649f72dea0e50e2317db042855d6c74ff3493c7e31e3f6c643155a8e2e01d50bc3347475750472719cc516fa14b769e7f385ba72c60242263c05ddab05e37efe81b8bffc35cdf2ac0d93263ff755d611c4cca1684b1470af6a83366aa430ad2d700b186da622d6fba70000000000000000000000000200"/173], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0xf8f, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r5, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000050001046c0000000040958d10000000000008080000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 51.272916961s ago: executing program 6 (id=1741): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x4, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x6) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'veth1_to_team\x00', 0x10}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='rpcgss_svc_seqno_low\x00', r3, 0x0, 0x867}, 0x18) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001400010000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r7, &(0x7f0000001040)=ANY=[], 0xffdd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x4, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x6) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'veth1_to_team\x00', 0x10}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='rpcgss_svc_seqno_low\x00', r3, 0x0, 0x867}, 0x18) (async) close(r1) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001400010000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) (async) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) write$cgroup_devices(r7, &(0x7f0000001040)=ANY=[], 0xffdd) (async) 51.191542252s ago: executing program 6 (id=1743): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x800, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005ffffde0d00000000000012030000000061005f0000"], &(0x7f0000000180)=""/192, 0x2a, 0xc0, 0x1, 0x6, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, r3, 0x0, 0x0, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd7, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x90) 51.190443731s ago: executing program 6 (id=1744): r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) (async, rerun: 64) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) syz_open_procfs$namespace(0x0, 0x0) (async, rerun: 64) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000ac0)=@o_path={&(0x7f0000000940)='./file0\x00', 0x0, 0x8, r0}, 0x18) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x4, 0x0, 0x40, 0x2, 0x0, 0x9, 0x100, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x1, @perf_bp={&(0x7f00000002c0), 0x3}, 0x200, 0xffffffff, 0xc, 0x5, 0xfe9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0xb) (async, rerun: 32) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000680)="85e403a4757def556fd27d97b4f9828a6df2addfd7b1394b035817faa4c8434469d4ef7f568db8b1bfa56590af0c53325f69ba2eaba8812017e373a7dcbdd125d97ab2f0387653ad4abeecc55a379077708579ac502650563a0c0e4971d9178abfaf80df685895423edaa953c99bd83a0cf5ce9df2009c3a5d55f0b8ae0024194e49cd4e2bff3e507ca1e935b705", 0x8e}, {&(0x7f00000008c0)="a98b5b10ccf990b3240be0df3345c2fde3fd281e5367720ae8fec23c1b69c56483bccf0f86ebd63cc7c48222b36f497401dedcab99e7d0011edc82f0d45bd2ce6a06ed92c8d0daefea67a8c2f1e055acafbe4766de7f35c0148a6319572a57489a494ccde7a9b06b7f81875a216fd3826aa8dabe6e", 0x75}, {&(0x7f0000000340)}, {&(0x7f0000000400)}, {&(0x7f0000000540)="0f938d813e741f8884c1", 0xa}], 0x5, &(0x7f0000000980)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @private=0xa010100}}}], 0x20}, 0x5d22f9a12f3ff9ae) (async, rerun: 32) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x7, 0x1000000, 0x8000007, 0x10, r3, 0x1, '\x00', 0x0, r4, 0x5, 0x0, 0x5, 0xa, @void, @value, @void, @value}, 0x50) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000000800000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x7, &(0x7f0000000580)=ANY=[@ANYBLOB="0580300001000000180000000700000000000000010000000b2e0100800000006783f8c9ffffffffff85100000080000008500000030000000"], &(0x7f0000000400)='GPL\x00', 0x8, 0xb9, &(0x7f00000004c0)=""/185, 0x41000, 0x10, '\x00', r8, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x6, 0x3, 0x9}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{0x1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)='%-010d \x00'}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r10, &(0x7f0000000240)="8eda43ee40e626f7d9a938c36b5b2a86c2882967c1f772d76ac6fe6db4b878144887344a69c15b393d931dc3591efefbc208189d002d18d4681c443ee0c7a13ee3b5cfd347a8e2acc09011e90747db76fbdffc4edfd150cde1aa3d8a415f1c781224ef7519a9a353d0fa1c1cfb889277828b581052ed192c99295a5388dc8659", &(0x7f0000000540)=""/202, 0x4}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r9}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 51.142708902s ago: executing program 6 (id=1745): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedea7538e4759c1b5253a1ee5ee100fe8000e800000000875a65969ff57b00000400000000009b0004"], 0xfe1b) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000001d80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="8502210000f4ffff07100008", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000040)="7d93aa2f035f8dae", &(0x7f0000000780)=""/213}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f0000000180)=""/111}, 0x20) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000001440)={'\x00', 0x52d35ce30131f272}) 51.128219822s ago: executing program 35 (id=1745): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedea7538e4759c1b5253a1ee5ee100fe8000e800000000875a65969ff57b00000400000000009b0004"], 0xfe1b) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000001d80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="8502210000f4ffff07100008", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000040)="7d93aa2f035f8dae", &(0x7f0000000780)=""/213}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f0000000180)=""/111}, 0x20) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000001440)={'\x00', 0x52d35ce30131f272}) 51.068383532s ago: executing program 5 (id=1747): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 32) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x30]}}, &(0x7f0000000280)=""/44, 0x1c, 0x2c, 0x0, 0xa3, 0x0, @void, @value}, 0x28) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) bpf$ENABLE_STATS(0x20, &(0x7f00000003c0), 0x4) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 64) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 51.067213352s ago: executing program 36 (id=1747): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 32) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x30]}}, &(0x7f0000000280)=""/44, 0x1c, 0x2c, 0x0, 0xa3, 0x0, @void, @value}, 0x28) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) bpf$ENABLE_STATS(0x20, &(0x7f00000003c0), 0x4) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 64) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 50.436181315s ago: executing program 7 (id=1749): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11, 0x4, 0x4, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b00)={{r3}, &(0x7f0000000a80), &(0x7f0000000ac0)=r4}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa2, &(0x7f0000000480)=[{}], 0x8, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x3c, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000840)={{0x1, 0xffffffffffffffff}, &(0x7f00000007c0), &(0x7f0000000800)='%pB \x00'}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000001d00001100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0x1f, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x883c}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffa}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfff}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}]}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x50, '\x00', 0x0, @fallback=0x11, r4, 0x8, &(0x7f0000000340)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x2, 0x8, 0x3ff}, 0x10, r5, 0xffffffffffffffff, 0x3, &(0x7f0000000880)=[r6, r7], &(0x7f00000008c0)=[{0x2, 0x3, 0x9}, {0x5, 0x1, 0x9, 0x7}, {0x2, 0x4, 0x10, 0x1}], 0x10, 0x9, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000001db685000000230000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000a000000b703000000000000850000007500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='percpu_free_percpu\x00', r8}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000540)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 50.433597025s ago: executing program 37 (id=1749): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11, 0x4, 0x4, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b00)={{r3}, &(0x7f0000000a80), &(0x7f0000000ac0)=r4}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa2, &(0x7f0000000480)=[{}], 0x8, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x3c, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000840)={{0x1, 0xffffffffffffffff}, &(0x7f00000007c0), &(0x7f0000000800)='%pB \x00'}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000001d00001100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0x1f, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x5}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x883c}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffa}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfff}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}]}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x50, '\x00', 0x0, @fallback=0x11, r4, 0x8, &(0x7f0000000340)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x2, 0x8, 0x3ff}, 0x10, r5, 0xffffffffffffffff, 0x3, &(0x7f0000000880)=[r6, r7], &(0x7f00000008c0)=[{0x2, 0x3, 0x9}, {0x5, 0x1, 0x9, 0x7}, {0x2, 0x4, 0x10, 0x1}], 0x10, 0x9, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000001db685000000230000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000a000000b703000000000000850000007500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='percpu_free_percpu\x00', r8}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000540)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 50.433416555s ago: executing program 0 (id=1751): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0500000005000000960000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000d51b0000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) sendmsg$unix(r2, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 50.417674875s ago: executing program 0 (id=1752): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x2b, &(0x7f0000000000)='/proc/sys/nft/ipv4\x00\x00s/syn\xd11=\x11\xc8\xff\x0f\x00\x00\xf1d\'%\x11c\x91l,'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 50.416244035s ago: executing program 38 (id=1752): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x2b, &(0x7f0000000000)='/proc/sys/nft/ipv4\x00\x00s/syn\xd11=\x11\xc8\xff\x0f\x00\x00\xf1d\'%\x11c\x91l,'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.14342458s ago: executing program 1 (id=2363): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000008c0)=@generic={&(0x7f00000006c0)='./file0\x00', r2}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0x0, 0x2, 0x18}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r4, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdd, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0xa7, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r9, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@bloom_filter={0x1e, 0x0, 0x803, 0xf7, 0x100, r9, 0x8, '\x00', r10, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0xa, &(0x7f00000009c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x81b}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x3, 0x2, 0x1, 0x1, 0x3, 0x20, 0xffffffffffffffff}], &(0x7f0000000a40)='GPL\x00', 0xa, 0x34, &(0x7f0000000a80)=""/52, 0x41000, 0x1, '\x00', r10, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000b00)=[r6], &(0x7f0000000b40)=[{0x0, 0x4, 0x2, 0x4}, {0x4, 0x5, 0x2, 0x3}, {0x2, 0x1, 0x1, 0x2}, {0x3, 0x5, 0xf, 0x3}, {0x4, 0x4, 0x8, 0x2}, {0x0, 0x5, 0xe, 0xc}], 0x10, 0x1, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x8, 0x16, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffff}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @jmp={0x5, 0x1, 0x4, 0xb, 0x0, 0xffffffffffffffff, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x44}, @map_val={0x18, 0xcc28a10cad3a4f24, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x0, 0xc, 0x8, 0x1, 0x6, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='GPL\x00', 0x7, 0x4e, &(0x7f0000000400)=""/78, 0x40f00, 0x40, '\x00', r7, @fallback=0x1d, r8, 0x8, &(0x7f0000000800)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x0, &(0x7f0000000880)=[{0x3, 0x2, 0x6}, {0x0, 0x5, 0x4, 0x1}, {0x3, 0x3, 0x7}, {0x2, 0x4, 0xb, 0xb}, {0x0, 0x1, 0x10, 0x1}], 0x10, 0xfffffffd, @void, @value}, 0x94) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@var={0xa, 0x0, 0x0, 0xe, 0x5, 0x2}, @struct={0xd, 0x2, 0x0, 0x4, 0x1, 0x1, [{0xf, 0x3, 0x2}, {0x0, 0x3, 0x80}]}]}, {0x0, [0x2e, 0x30, 0x61, 0x30, 0x5f, 0x0, 0x61]}}, &(0x7f0000000540)=""/107, 0x55, 0x6b, 0x1, 0x5, 0x0, @void, @value}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x7, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x10, 0xe, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @alu={0x4, 0x0, 0xc, 0x2, 0x7, 0x2, 0x8}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000040)='syzkaller\x00', 0x101, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x0, '\x00', r7, @sk_msg=0x7, r11, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r12, r1, 0x2, 0x0, &(0x7f0000000640)=[{0x2, 0x4, 0xa, 0x2}, {0x4, 0x3, 0xf}], 0x10, 0xcf, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r13}, 0x10) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r14, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 2.07878219s ago: executing program 1 (id=2364): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f00000005c0)=ANY=[], 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x912}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 2.07274962s ago: executing program 9 (id=2365): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0xffffffffffffffeb, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008400000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071123f000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x34) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.events\x00', 0x26e1, 0x0) ioctl$TUNSETNOCSUM(r3, 0xc0189436, 0x0) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000ee0000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r5 = openat$cgroup_subtree(r3, &(0x7f0000000240), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x2d, 'pids'}, {0x0, 'cpuset'}, {0x2b, 'net_cls'}, {0x2b, 'cpuacct'}, {0x2d, 'net'}, {0x2b, 'io'}]}, 0x29) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r4}, 0x10) 2.00750734s ago: executing program 9 (id=2367): r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0x6, 0x81, 0xd, 0x10, 0x0, 0x5, 0x201, 0x5, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x58, 0x2, 0x3, 0x4, 0xf12, 0x1, 0x5, 0x0, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000001c0)=0x7) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_clone(0x2c000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.97060646s ago: executing program 9 (id=2368): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) (async) r3 = openat$cgroup_int(r0, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000005"], &(0x7f0000000c40)=""/229, 0x26, 0xe5, 0x1, 0x0, 0x0, @void, @value}, 0x20) (async) syz_clone(0x4001000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) 1.846618771s ago: executing program 1 (id=2370): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0], &(0x7f0000000280)=[0x0, 0x0], 0x0, 0xc1, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xba, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f00000005c0)=ANY=[@ANYRES16=r2, @ANYRESDEC=r2, @ANYRES64=r6, @ANYRES64=r1, @ANYRESDEC=r4, @ANYRES8=r2, @ANYRESOCT=r3, @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.830069171s ago: executing program 1 (id=2372): syz_clone(0xc0126080, 0x0, 0x0, &(0x7f0000002100), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x1801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9426}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe40) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x894c, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000340), &(0x7f0000000200), 0x8, 0xa, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x3, 0x100ffff, 0x87b, 0x356, r1, 0xffff, '\x00', r2, 0xffffffffffffffff, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ffff1c01000000000000008510000024ff000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000018360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000540)='cpu&00\t||') socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_clone(0x640c7006, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x20, 0x3f8000, 0x8001, 0x7, 0x100, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000780)="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", &(0x7f0000001780)=""/196}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x39000) perf_event_open(&(0x7f0000000700)={0x5, 0x80, 0xde, 0x0, 0x0, 0x4, 0x0, 0x103ff, 0x162a2, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, r5, 0x0) socketpair(0x14, 0x0, 0x0, &(0x7f0000000000)) 1.766535842s ago: executing program 9 (id=2373): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="bda8c2dd3222533004ef7a2c3cad4b866792d114e2abc604a2463f163bb8d0abe30d5936f124ac302b5f4f689a170011a14e3ac27c68efa851f44dfc12029233a42ed1060e6b64c8c2c78e83506c8e1b19eb04dec9652c821082830f61e2cf70c4157b3caa64079efd3f7a0641927ff2716dce5fb024617ebfb010465012ab975a4cb16b33bd467220a444d18b9550282ff6f1d91ce48b39d32d9a84f07c2b1497ac7df9", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'vxcan1\x00', 0x10}) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r5}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r5, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.627942122s ago: executing program 9 (id=2375): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0d", 0x8c}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x58, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$SIOCSIFHWADDR(r8, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r6, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="1e00000007000000290000000100008022000400", @ANYRES32=r1, @ANYBLOB="ab0500"/20, @ANYRES32=r2, @ANYRES32=r9, @ANYBLOB="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"], 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r11 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r12}, 0x10) write$cgroup_subtree(r11, 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000001040)={'\x00', 0x4000}) 1.061129565s ago: executing program 1 (id=2383): bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xfffffd26) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000400000000000000000000000000000000000000000000fdec0042919fe9ef330241444d8a8a1706355a0299fa578234629ff0cae21801990ca11a89e020ac2fb4f82c3caee0bce84b9a816aa4d2ac564b674b5f3f1cd2c5efe0c557c11f97aa4e1ae4cfbd65548af3ac0830919a18caa33228c02e31c878854d237fc8f570253da3afc698f6b13d1e1a662c46a522236c8d1bd7ce27208372e4cbd9718e4ac60c6a14a80baea3967db49effedff11f37d7f445e2d03"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, 0xffffffffffffffff, 0x0, 0x1ba8847c99}, 0x38) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) 902.298516ms ago: executing program 3 (id=2388): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x2, 0x4, 0x4, 0x5, 0x1100, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 824.275086ms ago: executing program 3 (id=2390): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x3, 0x0, 0x2, 0x7, 0x0, 0x50, 0xfffffffffffffff0}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 798.281787ms ago: executing program 3 (id=2393): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000040000001e00000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000140)='mm_page_free_batched\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=0x8, 0x12) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 749.154477ms ago: executing program 3 (id=2394): bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000400)={'syzkaller0\x00', 0x5102}) write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[], 0xa) 520.262038ms ago: executing program 8 (id=2401): openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x48000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000a000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0xa120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x2, 0x1, 0x80}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 520.099078ms ago: executing program 2 (id=2402): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[@ANYBLOB='1-0:L'], 0x31) 476.220538ms ago: executing program 2 (id=2403): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='consume_skb\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x2000000000000000, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff80000001, 0x9}, 0x2000, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) 466.060349ms ago: executing program 8 (id=2404): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x208002, 0x0) close(r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) 320.249409ms ago: executing program 3 (id=2405): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20460, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x100020, 0x1, 0x0, 0x0, 0x5, 0x0, 0xc32c, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 186.58854ms ago: executing program 8 (id=2406): bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000002f00)={0x0, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r0, 0x4) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r0, 0x4) close(0x3) 173.99629ms ago: executing program 2 (id=2407): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 91.93673ms ago: executing program 2 (id=2408): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x5, 0x4, 0x3, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 91.55407ms ago: executing program 9 (id=2375): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0d", 0x8c}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x58, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$SIOCSIFHWADDR(r8, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r6, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="1e00000007000000290000000100008022000400", @ANYRES32=r1, @ANYBLOB="ab0500"/20, @ANYRES32=r2, @ANYRES32=r9, @ANYBLOB="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"], 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r11 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r12}, 0x10) write$cgroup_subtree(r11, 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000001040)={'\x00', 0x4000}) 91.42837ms ago: executing program 3 (id=2409): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="000084"], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 91.27343ms ago: executing program 8 (id=2410): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f0000001280)=r3, 0x4) 86.59481ms ago: executing program 8 (id=2411): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 86.37184ms ago: executing program 1 (id=2412): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r1, 0x4010744d, 0x20000000) 65.72328ms ago: executing program 8 (id=2413): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20460, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x100020, 0x1, 0x0, 0x0, 0x5, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xfd85}, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b1efd036d7af273bce36015779c4cef58fa35d17c668a4b63e069efb29797573b8538e31ec24925095a163b9d4e76be2661f2a395e41f7e31a8021e00b00104e0801d4de36e5fdc6c42a7b3ff13f2360a6e231fd223bc33091dd61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694dff0f0000000000003a45404b04bf97c4fea679c032b363956cd8bac9626b5db1b07a0bd7cc85e961506a35a04617dc0200379e731d3a8d8feac94a4ee293001f6ce7d5b40bf2a7f9be8173a9639a79fae885d05afe042c0e7821d406c967379e7521292d24d6c8034f2fc7c855a8945e9bce678ee9a015abc9daac8876623db56346916674ceb55f60b493f2f4d736acb2f206fc538450a676d71c01175b8454eb92567e8f8a707b590d7219288e23ee0800000000000010a49fc8f4ff0300000000000000000000cb947d6017ad27714772ad790af252e648ef8c313c604324f5b306000000000000cf327a00000000000000080a70162bba30ad7804fa4140f1a754ffff000000ab744d306619dfb3a37d897662bee00189f43da46a908a235c84cbad335fd1d2f2ef93a6a70c8b8ece0e243eab05a34ab0a7e7e497065e5e282e284f8d5e8852a265d528075214af000000000070d42182d8f3a347d48289a8b29b911ac473c5fa02bb0e24e5b7b238e27263a23c0b865f75331d888c72df1da4b290582f00024227f03204add786a87b23ceb17c25810e769fe2d6a7bd8e504843b66b1a8c7b364bd2194ba9c8f60ac0c9b18d8c1b9e1a736825c91b4dff0000c1c5dcffa295c2930000000000235d84b0193a5ea7c77cdb7de9ce1a59ab4158097b4dd13ebfaf4425c6855530b56a3320d85c8fe85f667998b1a7e589f486c107761108e4e230419fd27b6ad9c10b25c6b6ed84badbb970dcf133279dd355e41de944564bdab99c5c712a9fbc8e9691c775bb94f746505e1e748cf1710d52468b4b1625ce21612ed5e807dfb5f19f3267e5366b2c0b2a0be49ae476263c9407ac6c596bf3cf66204984f5aebf93d1caa220ea6969cea852fe9a7d1eee13f1f48722a69ad9fb850bd093a302b9250245900ad5c8e5f20ddf77ee3d5a168964fad1aa7347d36c502d02b1d96d753ef6fc354fc126070060c65c147651fca62c0a06939f40c90ebc3042e753fe91b5770b24f25c558736dd7e1e9fb214cbb04c5c6ee4c970b320ba6fb6ef4615f4092de54c519f4622e1224153463ea80248a45a95a189958f586d606dcaa9aac656cf95a2d35225cfb0e6f47486d5cbb04a590116d4de92e203e107d68728a189b0d537d2442beab2f8ce7b2dd357200dcd139e47267012fc2a2b6bad79be429d1ddaccbe0139f16ca1b9bc1103000000ed1ece54cfdbe04670bee9b42fe3dc42033997e2e700b6edb2b49b5f2f6001ee0a9e5d1bee199ce9124a5cb479040000000000000049ead5b02d5ea1dcf6cdcf332fe94b3c1932d8d391754774a32c9b7e6ca4023bce2c7281d27a2cb62383ab3a3bb535650fbfb96c89936855eb7a485698f0d20c3eedd6123ef8f218d52ea2c346f80acb8b9a71856d2f2d1a7c6f45ee127b6a1d1ac1e243ed02e49e8aafe835919564af915965a050c37ceff855bd2dec3452c7c38f5dbf1ff1ff00020000000000006a1a029ea6540b40b2f797813af2c7d4ed235c2dc5f1dbbfcc52b2f55fd3f9f100c4891d0cb4c10ed01489bf235c45822594d7a6edc9d1270a7819fc0c597fdfb4d7842da1b411346297a40bbf221bbf63ad3822575dcc01a3c34b5aa4e3750400000000000000fc0fd9c746cf0ed4b0343d00a154e6a869346256ffbd666a34414ab0f40bec45b1c24f02ac9bc20e69201968537dd4dc61323c8b6d3643183631664eeca616696fb30fe89c8bdb15037c801fca4a9c220fec5d14582a00b62548ddf2599e5ffc5330cefb8903d276eae21b0b4b20100ead8256636c7e754185e815dd21445cc965a0526da38021a3e540949494ef3041cfa5067f556a0af5c19d27ff4f61fa7762d7963c96853709e773f14c47eef784cb145ae9d6d37fc7b5d83e05ac773fcc429eae6826a9d207d4c39df8eed9cc2ae3f68df1c6495a82d02939b448bf8038521057714e6e6405000000be9e0b0025d16b7eff573f78364ed70a62a7b1e55311dc0193d47f9ecc8c7ad268dc6e2e75f8cc83315411bd6c6b88e1850ee757ac2f9e4d6ac510003717d5847a19e750db92d33d6bdc434d0b52b2eb4b1790459e35122f46b205120a54bf657da9fd55d43a89e333481de468f5984a69509e9eac7a5b39c004396e8cb3ab037fd62fa43f259f13ebc4b590e9ea07ea37689049c799cd444d45dabe3e3cf086768daa6816c37793d17a284d2828f5eab2d3d0bedd5334b7bb4c983fa9cd4bd86f0ad227901e83ef4871695380d25bea2929fa66382af6ddb89917ab100046151bd08fce74247955247daa1ea75139b9ce3771526503c7db3a4b3ff39301986c1fd9b5c42d39e768946c9a7ee8dd081bfb6ea5fa132ebdbe72d02ce9f2000000006f63ae8311afc4943c963d39e42c54a3f52d121bfb425fe268892f654febdaee43e95b5ae6749275e1ad8b8b279e1ae296e03a8d9386d8e199dc1f00000008000000000000000026c43493c622f041b47d329b248e8ccd92e9b17007ba2578eefcb59f50343722e6cba3be72fd037eb5fa243a395b5c83376a14414b32c2e8a33de8000000003927da2bec76f4e15c8bf3715c5bfe7b3617d0fcf9b5861554b5b76b8ae69c644a48931306a16cff8a38ea95553867e2c5fb1e99b1802e616345871b4611627874cfbe30fa5793c873ae6f75427f3eeda690147b9615b096d967c2d7f5ddf725f0544f8750a5ed04d6ca0f223506fec5d5e65b467c59459f6113cf41c174a63a17fc79d0b777a0c903c0d2e7f79b6f9ce68a3b72315407040f6a09cadc25e87b7c6b4a3079c7989b4cf04b2581b555fa9a2d74392939b4dbaa9e620e22ab975ac3a5a329157762c1f29075fbdd39451a56b97c90e4fde6782a7c78e7fbe8400054dcafcd51e9eef2d2ea10a3f2636ac2239cef5d8505060de55f472aa89cb8e0188f2ee96cb1ae8dee3c03d0a942c6289cbc4499cea402bd0550520f4aae98c436f18a667ae4efeb5e6a4b1b3f53536145a87578ead8ec76b17acd9d9629449714ed1302714c3519fdd8529b5a86ce2fabb7f285fe73730000000000000000000000000000000073b6f8e9255567374cb2cc80be58fca5b1dc50d85342e56beda632edb7f0a4abcabae102fadfbffecc6b1549315dda8e09d18a7fe5e1574e4fad426b6ca211da39a16dffdd661a20b20c390e00004b002cd83b754c3d32819c823027b3cf8f8da6e63d099712be370bb2aa06debff931ea0a2e7aa0390000000000000045b6720d74c470d49e1e97d1668bb75ad994089d723c2eeaad3f857937fa3df615121a1841ed452dd395788e1a82efda18b41c06c948ef44af8500fbe1ee0828a3b047afb80435935b0f99b381dcf101e9a1593bdaab3bc88c70bf56995a4790a339e1b62516356644ed7df6db419d0976a5169e68e8bd4712552c5ec03f2818c17c4a5bf1e5ecd9bb40074a63c66b61f4779226a99dc5ff9c442e93991570797493569e6f9ccd6d73bcbce41022e2731fc61b6bf0188c74a21471332a546ffe8e9dd738aa2ca782ff5a547a1ad7c348c59ff99d1496404eafcd0333df8f2801d39ad0c82735af24b819efc2fd67c6a53835f0af6a51d1b9123f4b9af7fa2ee2ebf4bc2973cf04380b41aa7577e35bcd28446bfcea19aa85440fe0fdce12e53da7b8842b7527a34d1bcb16fcdc84f2c46a78c01c2ff463cdd0d65267b0822e899e893514a02acd8c21583d181224175d08ff75223da84d53656eb7ab46ad442d70c67a6010029329924b8b39e6dc4b2077a4b9645d8e0a445ae2c7be53d66007d491ab0f6851a2cc1cffeed15f586a035c1a2888c56f43"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x2d1, 0xfffffffffffffd85, &(0x7f00000000c0)="b9ff03030018698cb89e40f086dd6000000e00001100630677", 0x0, 0x100, 0x2000000, 0x0, 0x0, &(0x7f0000000440)}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x7, 0x48, 0x5, 0x8, 0x0, 0x8, 0x8220, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x31b5, 0x1, @perf_config_ext={0x0, 0xfffffffffffffff8}, 0x0, 0x3, 0x4, 0x4, 0x7, 0x400, 0x7, 0x0, 0x3, 0x0, 0xd}, 0xffffffffffffffff, 0x0, r4, 0x1) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) write$cgroup_int(r4, &(0x7f0000000000)=0xaf7, 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40010) socketpair(0x11, 0x3, 0x300, &(0x7f0000000000)) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 339.13µs ago: executing program 2 (id=2414): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x1d}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xe, 0xfeff, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f00800", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 0s ago: executing program 2 (id=2415): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x5, 0x7fe2, 0x1, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)}, 0x20) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.91' (ED25519) to the list of known hosts. [ 18.491047][ T24] audit: type=1400 audit(1732384705.540:66): avc: denied { mounton } for pid=272 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.492015][ T272] cgroup: Unknown subsys name 'net' [ 18.497814][ T24] audit: type=1400 audit(1732384705.540:67): avc: denied { mount } for pid=272 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.503477][ T24] audit: type=1400 audit(1732384705.540:68): avc: denied { unmount } for pid=272 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.503617][ T272] cgroup: Unknown subsys name 'devices' [ 18.631097][ T272] cgroup: Unknown subsys name 'hugetlb' [ 18.636596][ T272] cgroup: Unknown subsys name 'rlimit' [ 18.771811][ T24] audit: type=1400 audit(1732384705.820:69): avc: denied { setattr } for pid=272 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 18.795459][ T24] audit: type=1400 audit(1732384705.820:70): avc: denied { mounton } for pid=272 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 18.807101][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 18.820493][ T24] audit: type=1400 audit(1732384705.820:71): avc: denied { mount } for pid=272 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 18.851636][ T272] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 18.851713][ T24] audit: type=1400 audit(1732384705.870:72): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.885480][ T24] audit: type=1400 audit(1732384705.870:73): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.910937][ T24] audit: type=1400 audit(1732384705.890:74): avc: denied { read } for pid=272 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.936642][ T24] audit: type=1400 audit(1732384705.890:75): avc: denied { open } for pid=272 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.426385][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.433351][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.440684][ T282] device bridge_slave_0 entered promiscuous mode [ 19.448418][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.455373][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.462467][ T282] device bridge_slave_1 entered promiscuous mode [ 19.528200][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.535159][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.542444][ T285] device bridge_slave_0 entered promiscuous mode [ 19.556111][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.563418][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.570740][ T283] device bridge_slave_0 entered promiscuous mode [ 19.578254][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.585196][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.592151][ T285] device bridge_slave_1 entered promiscuous mode [ 19.610554][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.617572][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.624746][ T283] device bridge_slave_1 entered promiscuous mode [ 19.679962][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.686882][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.694099][ T284] device bridge_slave_0 entered promiscuous mode [ 19.700654][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.707568][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.715132][ T284] device bridge_slave_1 entered promiscuous mode [ 19.742115][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.748960][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.756266][ T287] device bridge_slave_0 entered promiscuous mode [ 19.762975][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.769928][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.777193][ T287] device bridge_slave_1 entered promiscuous mode [ 19.808118][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.815000][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.822076][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.828878][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.861042][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.867880][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.875001][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.881811][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.945586][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.952934][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.960067][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.967776][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.975024][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.001706][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.009819][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.016659][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.024050][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.032503][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.039332][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.047108][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.054331][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.068538][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.080467][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.088507][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.095375][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.102774][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.111069][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.117963][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.125168][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.145529][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.152900][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.160982][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.167796][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.175693][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.183881][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.190993][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.198143][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.207534][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.223895][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.232604][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.239424][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.246602][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.254974][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.261935][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.269534][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.277326][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.285401][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.303038][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.311141][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.333990][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.342303][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.350532][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.357789][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.365815][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.374248][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.381185][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.388533][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.396713][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.403550][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.410724][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.418361][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.426233][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.434208][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.444547][ T282] device veth0_vlan entered promiscuous mode [ 20.455835][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.463892][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.471948][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.480107][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.493303][ T285] device veth0_vlan entered promiscuous mode [ 20.500330][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.508670][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.517181][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.525265][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.535652][ T282] device veth1_macvtap entered promiscuous mode [ 20.548918][ T285] device veth1_macvtap entered promiscuous mode [ 20.555611][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.562849][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.570430][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.578373][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.586321][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.593995][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.602076][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.610372][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.617990][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.626974][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.637626][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.645965][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.659870][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.667607][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.675465][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.684015][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.697916][ T284] device veth0_vlan entered promiscuous mode [ 20.707140][ T287] device veth0_vlan entered promiscuous mode [ 20.713374][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.720751][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.727983][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.736261][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.744909][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.752785][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.760796][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.768903][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.777069][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.784431][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.793694][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.801869][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.811842][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.820661][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.832039][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.840269][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.851206][ T284] device veth1_macvtap entered promiscuous mode [ 20.863741][ T283] device veth0_vlan entered promiscuous mode [ 20.873675][ T287] device veth1_macvtap entered promiscuous mode [ 20.880564][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.888099][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.896179][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.904157][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.912282][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.920500][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.928474][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.936735][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.951849][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.959173][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.966794][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.975001][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.000896][ T283] device veth1_macvtap entered promiscuous mode [ 21.013837][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.022214][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.030344][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.038261][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.046533][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.054820][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.062941][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.070620][ T282] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 21.088247][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.106165][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.140241][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.157899][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.180239][ C0] hrtimer: interrupt took 26387 ns [ 21.221693][ T319] cgroup: syz.1.2 (319) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 21.238084][ T319] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 22.315013][ T351] device syzkaller0 entered promiscuous mode [ 24.772177][ T24] kauditd_printk_skb: 53 callbacks suppressed [ 24.772188][ T24] audit: type=1400 audit(1732384711.820:129): avc: denied { setopt } for pid=464 comm="syz.4.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 24.857066][ T472] device pim6reg1 entered promiscuous mode [ 25.033146][ T24] audit: type=1400 audit(1732384712.080:130): avc: denied { write } for pid=483 comm="syz.4.48" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.164111][ T496] device veth1_macvtap left promiscuous mode [ 25.169937][ T24] audit: type=1400 audit(1732384712.140:131): avc: denied { create } for pid=492 comm="syz.2.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 25.935586][ T24] audit: type=1400 audit(1732384712.980:132): avc: denied { write } for pid=531 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 25.998098][ T529] device syzkaller0 entered promiscuous mode [ 26.133479][ T533] device syzkaller0 entered promiscuous mode [ 26.439795][ T547] syz.2.65[547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.439937][ T547] syz.2.65[547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.518113][ T24] audit: type=1400 audit(1732384713.560:133): avc: denied { create } for pid=549 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 26.642690][ T24] audit: type=1400 audit(1732384713.600:134): avc: denied { create } for pid=549 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 26.812540][ T24] audit: type=1400 audit(1732384713.860:135): avc: denied { create } for pid=565 comm="syz.3.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.815865][ T569] device macsec0 entered promiscuous mode [ 27.853765][ T24] audit: type=1400 audit(1732384714.900:136): avc: denied { create } for pid=627 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 28.084284][ T24] audit: type=1400 audit(1732384715.130:137): avc: denied { create } for pid=644 comm="syz.0.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 28.420788][ T657] device sit0 entered promiscuous mode [ 29.344476][ T24] audit: type=1400 audit(1732384716.390:138): avc: denied { append } for pid=714 comm="syz.2.116" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.251856][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 30.251867][ T24] audit: type=1400 audit(1732384717.300:140): avc: denied { cpu } for pid=748 comm="syz.1.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.385792][ T24] audit: type=1400 audit(1732384717.300:141): avc: denied { create } for pid=748 comm="syz.1.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 31.006247][ T785] syz.1.138[785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.009526][ T785] syz.1.138[785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.138170][ T787] device syzkaller0 entered promiscuous mode [ 31.188138][ T785] syz.1.138[785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.189372][ T785] syz.1.138[785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.254009][ T792] device pim6reg1 entered promiscuous mode [ 31.642143][ T799] syz.2.142[799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.643356][ T799] syz.2.142[799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.788203][ T24] audit: type=1400 audit(1732384718.830:142): avc: denied { create } for pid=813 comm="syz.4.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 31.941187][ T818] ªªªªªª: renamed from vlan0 [ 32.186733][ T838] device sit0 entered promiscuous mode [ 32.678168][ T24] audit: type=1400 audit(1732384719.720:143): avc: denied { create } for pid=863 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 32.794490][ T868] device pim6reg1 entered promiscuous mode [ 32.826215][ T24] audit: type=1400 audit(1732384719.870:144): avc: denied { create } for pid=875 comm="syz.0.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 32.853897][ T878] device pim6reg1 entered promiscuous mode [ 32.983483][ T24] audit: type=1400 audit(1732384720.030:145): avc: denied { create } for pid=892 comm="syz.1.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 33.022375][ T897] ÿÿÿÿÿÿ: renamed from vlan1 [ 33.064138][ T24] audit: type=1400 audit(1732384720.060:146): avc: denied { create } for pid=890 comm="syz.4.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 33.384953][ T907] device veth0_vlan left promiscuous mode [ 33.397092][ T907] device veth0_vlan entered promiscuous mode [ 34.666042][ T1018] device syzkaller0 entered promiscuous mode [ 34.854601][ T1040] device pim6reg1 entered promiscuous mode [ 35.293505][ T1057] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 37.049398][ T24] audit: type=1400 audit(1732384724.070:147): avc: denied { create } for pid=1111 comm="syz.2.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 37.087926][ T1124] device pim6reg1 entered promiscuous mode [ 37.154624][ T1130] device veth0_vlan left promiscuous mode [ 37.184342][ T1130] device veth0_vlan entered promiscuous mode [ 37.576433][ T24] audit: type=1400 audit(1732384724.620:148): avc: denied { tracepoint } for pid=1162 comm="syz.4.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 37.691664][ T1165] device syzkaller0 entered promiscuous mode [ 38.191525][ T24] audit: type=1400 audit(1732384725.240:149): avc: denied { create } for pid=1183 comm="syz.3.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 38.334367][ T1191] syz.0.253[1191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.334421][ T1191] syz.0.253[1191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.430904][ T1195] ------------[ cut here ]------------ [ 38.498343][ T1195] trace type BPF program uses run-time allocation [ 38.526661][ T1195] WARNING: CPU: 0 PID: 1195 at kernel/bpf/verifier.c:10493 check_map_prog_compatibility+0x65b/0x7c0 [ 38.559770][ T1195] Modules linked in: [ 38.565859][ T1195] CPU: 1 PID: 1195 Comm: syz.1.254 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 38.620632][ T1208] rose0: tun_chr_ioctl cmd 1074025677 [ 38.625836][ T1208] rose0: linktype set to 805 [ 38.633429][ T1195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 38.666971][ T1195] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 38.679846][ T1207] rose0: tun_chr_ioctl cmd 1074025673 [ 38.696578][ T1195] Code: c8 e9 84 fe ff ff e8 34 f4 ee ff 31 db e9 85 fe ff ff e8 28 f4 ee ff c6 05 0e 1d 65 05 01 48 c7 c7 60 74 45 85 e8 15 7a c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 38.736952][ T1195] RSP: 0018:ffffc9000131ef90 EFLAGS: 00010246 [ 38.779745][ T1195] RAX: 3c8f6881cb52fa00 RBX: ffff888119ef8000 RCX: ffff888118c562c0 [ 38.795788][ T1195] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 38.820250][ T1195] RBP: ffffc9000131efd0 R08: ffffffff81522098 R09: ffffed103ee0a5f8 [ 38.828533][ T1195] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 38.857304][ T1195] R13: 1ffff92000015604 R14: ffff888119d24000 R15: ffffc900000ab020 [ 38.868971][ T1195] FS: 00007fce113a76c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 38.898946][ T1195] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 38.913991][ T1195] CR2: 00007fbe55beff98 CR3: 0000000127b7c000 CR4: 00000000003506b0 [ 38.922687][ T1195] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 38.934546][ T1195] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 38.949001][ T1195] Call Trace: [ 38.961533][ T1195] ? show_regs+0x58/0x60 [ 38.965699][ T1195] ? __warn+0x160/0x2f0 [ 38.968818][ T1231] tap0: tun_chr_ioctl cmd 21731 [ 38.974241][ T1195] ? check_map_prog_compatibility+0x65b/0x7c0 [ 38.987090][ T1195] ? report_bug+0x3d9/0x5b0 [ 38.999038][ T1195] ? check_map_prog_compatibility+0x65b/0x7c0 [ 39.006904][ T1195] ? handle_bug+0x41/0x70 [ 39.012200][ T1195] ? exc_invalid_op+0x1b/0x50 [ 39.017129][ T1195] ? asm_exc_invalid_op+0x12/0x20 [ 39.022581][ T1195] ? wake_up_klogd+0xb8/0xf0 [ 39.027119][ T1195] ? check_map_prog_compatibility+0x65b/0x7c0 [ 39.033363][ T1195] ? __fdget+0x1bc/0x240 [ 39.037470][ T1195] resolve_pseudo_ldimm64+0x586/0x1020 [ 39.042801][ T1195] ? bpf_check+0xf2b0/0xf2b0 [ 39.047253][ T1195] ? kvmalloc_node+0x82/0x130 [ 39.052089][ T1235] tap0: tun_chr_ioctl cmd 1074025698 [ 39.066290][ T1195] bpf_check+0xaf21/0xf2b0 [ 39.080421][ T1195] ? stack_depot_save+0xe/0x10 [ 39.093778][ T1195] ? __se_sys_bpf+0x9856/0x11cb0 [ 39.107319][ T1195] ? sched_clock+0x3a/0x40 [ 39.119473][ T1195] ? 0xffffffffa0002ecc [ 39.159719][ T1195] ? bpf_get_btf_vmlinux+0x60/0x60 [ 39.203590][ T1195] ? __kernel_text_address+0x9b/0x110 [ 39.229745][ T1195] ? unwind_get_return_address+0x4d/0x90 [ 39.235372][ T1195] ? arch_stack_walk+0xf3/0x140 [ 39.250888][ T1195] ? stack_trace_save+0x113/0x1c0 [ 39.266920][ T1195] ? stack_trace_snprint+0xf0/0xf0 [ 39.283178][ T1195] ? stack_trace_snprint+0xf0/0xf0 [ 39.308036][ T1195] ? selinux_bpf_prog_alloc+0x51/0x140 [ 39.326432][ T1195] ? selinux_bpf_prog_alloc+0x51/0x140 [ 39.345849][ T1195] ? ____kasan_kmalloc+0xed/0x110 [ 39.364814][ T1195] ? ____kasan_kmalloc+0xdb/0x110 [ 39.384872][ T1195] ? __kasan_kmalloc+0x9/0x10 [ 39.402405][ T1195] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 39.424166][ T1195] ? selinux_bpf_prog_alloc+0x51/0x140 [ 39.444834][ T1195] ? security_bpf_prog_alloc+0x62/0x90 [ 39.466676][ T1195] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 39.486902][ T1195] ? __x64_sys_bpf+0x7b/0x90 [ 39.505356][ T1195] ? do_syscall_64+0x34/0x70 [ 39.521778][ T1195] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 39.539615][ T1195] ? __kasan_kmalloc+0x9/0x10 [ 39.571941][ T1195] __se_sys_bpf+0x107a2/0x11cb0 [ 39.589073][ T1195] ? futex_wait+0x6a0/0x7c0 [ 39.605631][ T1195] ? __x64_sys_bpf+0x90/0x90 [ 39.622062][ T1195] ? do_futex+0x17b0/0x17b0 [ 39.642381][ T1195] ? fsnotify_destroy_marks+0x1ee/0x5b0 [ 39.662006][ T1195] ? do_futex+0x139a/0x17b0 [ 39.678450][ T1195] ? clear_inode+0x13b/0x190 [ 39.696318][ T1195] ? evict+0x8e8/0x9c0 [ 39.723368][ T1195] ? mode_strip_sgid+0x140/0x140 [ 39.749246][ T1195] ? _raw_spin_lock+0xa4/0x1b0 [ 39.776011][ T1195] ? _raw_spin_trylock_bh+0x190/0x190 [ 39.818649][ T1195] ? futex_exit_release+0x1e0/0x1e0 [ 39.889838][ T1195] ? __kasan_check_write+0x14/0x20 [ 39.894794][ T1195] ? __kasan_check_write+0x14/0x20 [ 39.909862][ T1195] ? _atomic_dec_and_lock+0xfc/0x140 [ 39.915008][ T1195] ? __fget_files+0x31e/0x380 [ 39.949761][ T1195] ? _raw_spin_lock+0xa4/0x1b0 [ 39.965838][ T1195] ? _raw_spin_trylock_bh+0x190/0x190 [ 40.001484][ T1195] ? __se_sys_futex+0x355/0x470 [ 40.006183][ T1195] ? fpu__clear_all+0x20/0x20 [ 40.029960][ T1195] ? __kasan_check_read+0x11/0x20 [ 40.034892][ T1195] __x64_sys_bpf+0x7b/0x90 [ 40.039250][ T1195] do_syscall_64+0x34/0x70 [ 40.044034][ T1195] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.050138][ T1195] RIP: 0033:0x7fce12d2e819 [ 40.055076][ T1195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.075474][ T1195] RSP: 002b:00007fce113a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 40.089435][ T1195] RAX: ffffffffffffffda RBX: 00007fce12ee5fa0 RCX: 00007fce12d2e819 [ 40.097533][ T1195] RDX: 0000000000000094 RSI: 00000000200000c0 RDI: 0000000000000005 [ 40.107092][ T1195] RBP: 00007fce12da175e R08: 0000000000000000 R09: 0000000000000000 [ 40.115198][ T1195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 40.123621][ T1195] R13: 0000000000000000 R14: 00007fce12ee5fa0 R15: 00007ffd2814f1d8 [ 40.132410][ T1195] ---[ end trace 4bcee774fc1fa593 ]--- [ 40.569169][ T1295] syz.1.281[1295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.569226][ T1295] syz.1.281[1295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.664695][ T1300] syz.0.282[1300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.689763][ T1300] syz.0.282[1300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.823948][ T1302] device syzkaller0 entered promiscuous mode [ 41.921500][ T1341] device pim6reg1 entered promiscuous mode [ 43.669545][ T1369] device syzkaller0 entered promiscuous mode [ 47.555048][ T24] audit: type=1400 audit(1732384734.600:150): avc: denied { create } for pid=1448 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 47.659748][ T24] audit: type=1400 audit(1732384734.630:151): avc: denied { write } for pid=1451 comm="syz.3.330" name="cgroup.subtree_control" dev="cgroup2" ino=269 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 47.721590][ T1458] device pim6reg1 entered promiscuous mode [ 47.759693][ T24] audit: type=1400 audit(1732384734.630:152): avc: denied { open } for pid=1451 comm="syz.3.330" path="" dev="cgroup2" ino=269 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 49.752238][ T1494] device pim6reg1 entered promiscuous mode [ 54.040249][ T1572] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 54.098780][ T1572] device syzkaller0 entered promiscuous mode [ 54.320115][ T24] audit: type=1400 audit(1732384741.370:153): avc: denied { create } for pid=1583 comm="syz.3.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 54.430641][ T24] audit: type=1400 audit(1732384741.480:154): avc: denied { create } for pid=1585 comm="syz.3.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 54.739280][ T1593] syz.1.373[1593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.743685][ T1593] syz.1.373[1593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.262887][ T24] audit: type=1400 audit(1732384743.310:155): avc: denied { ioctl } for pid=1629 comm="syz.2.383" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.760352][ T1731] device sit0 entered promiscuous mode [ 63.581874][ T1820] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.588971][ T1820] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.656141][ T1821] device bridge_slave_1 left promiscuous mode [ 63.668641][ T1821] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.700366][ T1821] device bridge_slave_0 left promiscuous mode [ 63.716642][ T1821] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.908086][ T1833] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.915246][ T1833] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.924573][ T1834] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.931803][ T1834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.938949][ T1834] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.945915][ T1834] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.953954][ T1834] device bridge0 entered promiscuous mode [ 64.689215][ T1898] syz.2.465[1898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.701277][ T1898] syz.2.465[1898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.754920][ T1919] ÿÿÿÿÿÿ: renamed from vlan1 [ 65.235174][ T1982] device syzkaller0 entered promiscuous mode [ 65.276822][ T1991] syz.0.493[1991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.276907][ T1991] syz.0.493[1991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.291881][ T1991] syz.0.493[1991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.303292][ T1991] syz.0.493[1991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.430761][ T1989] device syzkaller0 entered promiscuous mode [ 65.658115][ T24] audit: type=1400 audit(1732384752.700:156): avc: denied { create } for pid=2033 comm="syz.4.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 65.772232][ T2040] device sit0 left promiscuous mode [ 65.792014][ T2040] device sit0 entered promiscuous mode [ 67.169282][ T2135] device veth0_vlan left promiscuous mode [ 67.186838][ T2135] device veth0_vlan entered promiscuous mode [ 67.228609][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.237692][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 67.245527][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.365937][ T2152] device pim6reg1 entered promiscuous mode [ 67.902043][ T2166] syz.0.544[2166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.902078][ T2166] syz.0.544[2166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.576136][ T2198] device pim6reg1 entered promiscuous mode [ 68.709320][ T2204] device pim6reg1 entered promiscuous mode [ 69.578469][ T2265] device pim6reg1 entered promiscuous mode [ 70.062163][ T2337] tap0: tun_chr_ioctl cmd 1074812118 [ 70.385848][ T2362] device veth0_vlan left promiscuous mode [ 70.393425][ T2362] device veth0_vlan entered promiscuous mode [ 70.436675][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.468911][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 70.476771][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 70.912945][ T24] audit: type=1400 audit(1732384757.960:157): avc: denied { ioctl } for pid=2407 comm="syz.3.615" path="socket:[21203]" dev="sockfs" ino=21203 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 71.272661][ T24] audit: type=1400 audit(1732384758.320:158): avc: denied { create } for pid=2430 comm="syz.1.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 71.703002][ T2443] device pim6reg1 entered promiscuous mode [ 71.748362][ T24] audit: type=1400 audit(1732384758.790:159): avc: denied { create } for pid=2449 comm="syz.3.630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 71.930286][ T2453] device veth0_vlan left promiscuous mode [ 71.938431][ T2453] device veth0_vlan entered promiscuous mode [ 72.286771][ T2467] device pim6reg1 entered promiscuous mode [ 73.538008][ T2512] device pim6reg1 entered promiscuous mode [ 73.592361][ T2519] device pim6reg1 entered promiscuous mode [ 74.415255][ T2575] device pim6reg1 entered promiscuous mode [ 75.520627][ T2664] syz.4.699[2664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.520684][ T2664] syz.4.699[2664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.669189][ T2671] device pim6reg1 entered promiscuous mode [ 76.557193][ T2777] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.565237][ T2777] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.572689][ T2777] device bridge_slave_0 entered promiscuous mode [ 76.599838][ T2777] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.606684][ T2777] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.614645][ T2777] device bridge_slave_1 entered promiscuous mode [ 76.661750][ T2784] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.668851][ T2784] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.676012][ T2784] device bridge_slave_0 entered promiscuous mode [ 76.683483][ T2784] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.690370][ T2784] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.697596][ T2784] device bridge_slave_1 entered promiscuous mode [ 76.759431][ T2779] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.766798][ T2779] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.774913][ T2779] device bridge_slave_0 entered promiscuous mode [ 76.795768][ T2779] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.809662][ T2779] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.817002][ T2779] device bridge_slave_1 entered promiscuous mode [ 76.875112][ T2784] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.882160][ T2784] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.889339][ T2784] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.896231][ T2784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.958073][ T2777] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.964934][ T2777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.972265][ T2777] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.979331][ T2777] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.047115][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.054869][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.064442][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.072080][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.080675][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.110885][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.124655][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.134160][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.141039][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.149570][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.158559][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.165855][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.204715][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.212708][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.222052][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.231013][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.237999][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.298413][ T2784] device veth0_vlan entered promiscuous mode [ 77.309192][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.318174][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 77.327995][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 77.336131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.344343][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 77.366917][ T2784] device veth1_macvtap entered promiscuous mode [ 77.378807][ T2808] device pim6reg1 entered promiscuous mode [ 77.386347][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 77.395315][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.403505][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.413269][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.432637][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.439722][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.447321][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.455746][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.462707][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.487536][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.497969][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.506730][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.527156][ T2779] device veth0_vlan entered promiscuous mode [ 77.544234][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 77.560254][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 77.580485][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.590250][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 77.615913][ T2777] device veth0_vlan entered promiscuous mode [ 77.648741][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 77.656864][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 77.665985][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 77.673897][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 77.681891][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 77.690132][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 77.698388][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 77.706922][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 77.739933][ T2779] device veth1_macvtap entered promiscuous mode [ 77.753439][ T2777] device veth1_macvtap entered promiscuous mode [ 77.760855][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.768615][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 77.776290][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 77.785648][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 77.794105][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 77.801906][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 77.810462][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 77.818739][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 77.827164][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 77.835584][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 77.881479][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 77.890092][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 77.898277][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 77.906169][ T24] audit: type=1400 audit(1732384764.940:160): avc: denied { mounton } for pid=2784 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 77.929535][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 77.984617][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 77.999141][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 78.141122][ T111] device bridge_slave_1 left promiscuous mode [ 78.147164][ T111] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.154942][ T111] device bridge_slave_0 left promiscuous mode [ 78.161311][ T111] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.179133][ T111] device bridge_slave_1 left promiscuous mode [ 78.185713][ T111] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.193505][ T111] device bridge_slave_0 left promiscuous mode [ 78.199485][ T111] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.208262][ T111] device veth1_macvtap left promiscuous mode [ 78.214873][ T111] device veth1_macvtap left promiscuous mode [ 78.221186][ T111] device veth0_vlan left promiscuous mode [ 78.227384][ T111] device veth0_vlan left promiscuous mode [ 78.750084][ T2853] device veth1_macvtap left promiscuous mode [ 79.915832][ T24] audit: type=1400 audit(1732384766.960:161): avc: denied { create } for pid=2894 comm="syz.2.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 80.000855][ T24] audit: type=1400 audit(1732384767.050:162): avc: denied { append } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 80.025890][ T2902] syz.7.771 uses obsolete (PF_INET,SOCK_PACKET) [ 80.062691][ T24] audit: type=1400 audit(1732384767.050:163): avc: denied { open } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 80.088526][ T24] audit: type=1400 audit(1732384767.050:164): avc: denied { getattr } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 80.548624][ T2935] device veth0_vlan left promiscuous mode [ 80.565592][ T2935] device veth0_vlan entered promiscuous mode [ 80.679971][ T2945] device syzkaller0 entered promiscuous mode [ 83.143834][ T3059] device pim6reg1 entered promiscuous mode [ 83.672392][ T3118] device pim6reg1 entered promiscuous mode [ 83.782130][ T3130] syz.6.829[3130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.782258][ T3130] syz.6.829[3130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.225808][ T3165] device syzkaller0 entered promiscuous mode [ 84.832017][ T3204] device syzkaller0 entered promiscuous mode [ 84.892473][ T3216] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 84.976328][ T3229] device syzkaller0 entered promiscuous mode [ 84.999578][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 85.236214][ T3246] ªªªªªªÿÿ: renamed from vlan0 [ 85.346894][ T24] audit: type=1400 audit(1732384772.390:165): avc: denied { create } for pid=3255 comm="syz.5.867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 85.496972][ T3270] device sit0 entered promiscuous mode [ 86.034197][ T3294] device pim6reg1 entered promiscuous mode [ 86.113913][ T24] audit: type=1400 audit(1732384773.160:166): avc: denied { create } for pid=3315 comm="syz.0.883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 87.064566][ T3373] device syzkaller0 entered promiscuous mode [ 92.479716][ T24] audit: type=1400 audit(1732384779.500:167): avc: denied { remove_name } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 92.661018][ T24] audit: type=1400 audit(1732384779.500:168): avc: denied { rename } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 92.849721][ T24] audit: type=1400 audit(1732384779.500:169): avc: denied { create } for pid=76 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 97.515762][ T3436] 8ûÅ: renamed from syzkaller0 [ 97.816639][ T3455] device syzkaller0 entered promiscuous mode [ 97.969826][ T3475] device syzkaller0 entered promiscuous mode [ 98.075629][ T3484] device syzkaller0 entered promiscuous mode [ 98.129434][ T3490] syz.7.933[3490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.129503][ T3490] syz.7.933[3490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.312515][ T3510] device xfrm0 entered promiscuous mode [ 98.611417][ T3538] device pim6reg1 entered promiscuous mode [ 99.602974][ T3617] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.611093][ T3617] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.674121][ T3648] device pim6reg1 entered promiscuous mode [ 101.153601][ T3686] device pim6reg1 entered promiscuous mode [ 101.279154][ T3703] device pim6reg1 entered promiscuous mode [ 102.370202][ T3773] device syzkaller0 entered promiscuous mode [ 102.636694][ T3810] device syzkaller0 entered promiscuous mode [ 102.904872][ T3837] : renamed from ipvlan1 [ 102.948418][ T3844] device wg2 entered promiscuous mode [ 103.042667][ T3856] syz.7.1042[3856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.042726][ T3856] syz.7.1042[3856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.526096][ T3876] device veth0_vlan left promiscuous mode [ 103.598068][ T3876] device veth0_vlan entered promiscuous mode [ 103.653985][ T3886] device sit0 left promiscuous mode [ 103.712116][ T3886] device sit0 entered promiscuous mode [ 103.957922][ T3895] device pim6reg1 entered promiscuous mode [ 104.029294][ T3895] device syzkaller0 entered promiscuous mode [ 104.553026][ T3922] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.561380][ T3922] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.196101][ T3960] tun0: tun_chr_ioctl cmd 2147767520 [ 106.045539][ T4035] device syzkaller0 entered promiscuous mode [ 106.110709][ T4048] device sit0 left promiscuous mode [ 106.131873][ T4048] device sit0 entered promiscuous mode [ 106.899117][ T4085] device syzkaller0 entered promiscuous mode [ 107.056873][ T4100] device syzkaller0 entered promiscuous mode [ 107.460141][ T4115] device syzkaller0 entered promiscuous mode [ 107.496939][ T4136] device syzkaller0 entered promiscuous mode [ 107.655103][ T4142] syz.2.1132 (4142) used obsolete PPPIOCDETACH ioctl [ 107.672721][ T4157] device veth1_macvtap left promiscuous mode [ 107.798728][ T4157] device veth1_macvtap entered promiscuous mode [ 107.834650][ T4157] device macsec0 entered promiscuous mode [ 108.105080][ T4203] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.113597][ T4203] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.162797][ T4211] device veth0_vlan left promiscuous mode [ 108.175406][ T4211] device veth0_vlan entered promiscuous mode [ 108.203501][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.221004][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.230851][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 108.244985][ T4207] device pim6reg1 entered promiscuous mode [ 108.354054][ T4227] device pim6reg1 entered promiscuous mode [ 108.495609][ T4257] device veth1_macvtap entered promiscuous mode [ 108.502946][ T4257] device macsec0 entered promiscuous mode [ 108.519290][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 108.905555][ T4278] device veth0_vlan left promiscuous mode [ 108.914409][ T4278] device veth0_vlan entered promiscuous mode [ 109.853887][ T4328] device sit0 entered promiscuous mode [ 109.916431][ T4330] device syzkaller0 entered promiscuous mode [ 110.053332][ T4347] syz.0.1199[4347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.053378][ T4347] syz.0.1199[4347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.221261][ T4397] device pim6reg1 entered promiscuous mode [ 111.800352][ T4421] syz.6.1223[4421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.800414][ T4421] syz.6.1223[4421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.841289][ T4419] device pim6reg1 entered promiscuous mode [ 112.098902][ T4428] syz.5.1225[4428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.098955][ T4428] syz.5.1225[4428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.192965][ T4433] device sit0 left promiscuous mode [ 113.390079][ T94] udevd[94]: worker [3404] terminated by signal 33 (Unknown signal 33) [ 113.423536][ T94] udevd[94]: worker [3404] failed while handling '/devices/virtual/block/loop5' [ 113.759253][ T94] udevd[94]: worker [3413] terminated by signal 33 (Unknown signal 33) [ 113.776456][ T94] udevd[94]: worker [3413] failed while handling '/devices/virtual/block/loop7' [ 113.818352][ T94] udevd[94]: worker [3412] terminated by signal 33 (Unknown signal 33) [ 113.852088][ T94] udevd[94]: worker [3412] failed while handling '/devices/virtual/block/loop6' [ 113.950277][ T4537] FAULT_INJECTION: forcing a failure. [ 113.950277][ T4537] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 113.969718][ T4537] CPU: 0 PID: 4537 Comm: syz.5.1258 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 113.980816][ T4537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 113.990914][ T4537] Call Trace: [ 113.994051][ T4537] dump_stack_lvl+0x1e2/0x24b [ 113.998549][ T4537] ? panic+0x812/0x812 [ 114.002547][ T4537] ? bfq_pos_tree_add_move+0x43b/0x43b [ 114.007933][ T4537] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 114.014545][ T4537] ? proc_fail_nth_write+0x20b/0x290 [ 114.019670][ T4537] dump_stack+0x15/0x17 [ 114.023660][ T4537] should_fail+0x3c6/0x510 [ 114.027921][ T4537] should_fail_usercopy+0x1a/0x20 [ 114.032881][ T4537] _copy_from_user+0x20/0xd0 [ 114.037299][ T4537] perf_copy_attr+0x15e/0x760 [ 114.041815][ T4537] __se_sys_perf_event_open+0xdd/0x3c30 [ 114.047287][ T4537] ? __kasan_check_write+0x14/0x20 [ 114.052406][ T4537] ? mutex_lock+0xa5/0x110 [ 114.056751][ T4537] ? mutex_trylock+0xa0/0xa0 [ 114.061186][ T4537] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 114.066733][ T4537] ? __ia32_sys_read+0x90/0x90 [ 114.071331][ T4537] __x64_sys_perf_event_open+0xbf/0xd0 [ 114.076793][ T4537] do_syscall_64+0x34/0x70 [ 114.081046][ T4537] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 114.086771][ T4537] RIP: 0033:0x7eff85818819 [ 114.091021][ T4537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.110829][ T4537] RSP: 002b:00007eff83e91038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 114.119055][ T4537] RAX: ffffffffffffffda RBX: 00007eff859cffa0 RCX: 00007eff85818819 [ 114.127128][ T4537] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001080 [ 114.134947][ T4537] RBP: 00007eff83e91090 R08: 0000000000000000 R09: 0000000000000000 [ 114.142752][ T4537] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 114.150996][ T4537] R13: 0000000000000000 R14: 00007eff859cffa0 R15: 00007ffee183bff8 [ 114.301209][ T4554] device veth1_macvtap left promiscuous mode [ 114.626871][ T4587] device veth0_vlan left promiscuous mode [ 114.654695][ T4587] device veth0_vlan entered promiscuous mode [ 114.760147][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.776245][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªªÿÿ: link becomes ready [ 114.801297][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.844121][ T4595] device pim6reg1 entered promiscuous mode [ 115.003210][ T4608] device veth0_to_bond entered promiscuous mode [ 115.152589][ T4616] device syzkaller0 entered promiscuous mode [ 115.573637][ T4651] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.581595][ T4651] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.590174][ T4651] device bridge0 left promiscuous mode [ 115.800325][ T4660] syz.2.1298[4660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.800384][ T4660] syz.2.1298[4660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.292628][ T4691] device syzkaller0 entered promiscuous mode [ 116.336955][ T4694] device veth0_vlan left promiscuous mode [ 116.363500][ T4694] device veth0_vlan entered promiscuous mode [ 116.442516][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.450998][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.458365][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.518823][ T4704] device pim6reg1 entered promiscuous mode [ 116.624524][ T4713] syz.2.1315[4713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.624588][ T4713] syz.2.1315[4713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.991209][ T4732] device veth0_vlan left promiscuous mode [ 117.100371][ T4732] device veth0_vlan entered promiscuous mode [ 117.347349][ T4770] device pim6reg1 entered promiscuous mode [ 117.453588][ T4770] syz.0.1334[4770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.455050][ T4770] syz.0.1334[4770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.512545][ T4778] device veth0_vlan left promiscuous mode [ 117.544857][ T4778] device veth0_vlan entered promiscuous mode [ 117.576870][ T4782] device pim6reg1 entered promiscuous mode [ 117.811806][ T4813] device syzkaller0 entered promiscuous mode [ 118.573844][ T4845] device pim6reg1 entered promiscuous mode [ 118.651302][ T4854] FAULT_INJECTION: forcing a failure. [ 118.651302][ T4854] name failslab, interval 1, probability 0, space 0, times 1 [ 118.664961][ T4854] CPU: 1 PID: 4854 Comm: syz.2.1362 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 118.676198][ T4854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 118.686096][ T4854] Call Trace: [ 118.689219][ T4854] dump_stack_lvl+0x1e2/0x24b [ 118.693834][ T4854] ? bfq_pos_tree_add_move+0x43b/0x43b [ 118.699117][ T4854] dump_stack+0x15/0x17 [ 118.703126][ T4854] should_fail+0x3c6/0x510 [ 118.707366][ T4854] ? create_local_trace_uprobe+0x167/0x6f0 [ 118.712998][ T4854] __should_failslab+0xa4/0xe0 [ 118.717600][ T4854] should_failslab+0x9/0x20 [ 118.722025][ T4854] kmem_cache_alloc_trace+0x3a/0x2e0 [ 118.727160][ T4854] create_local_trace_uprobe+0x167/0x6f0 [ 118.732623][ T4854] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 118.737740][ T4854] ? _copy_from_user+0x96/0xd0 [ 118.742338][ T4854] perf_uprobe_init+0xfa/0x1a0 [ 118.746938][ T4854] perf_uprobe_event_init+0x106/0x190 [ 118.752145][ T4854] perf_try_init_event+0x143/0x410 [ 118.757094][ T4854] perf_event_alloc+0xcf5/0x1970 [ 118.761869][ T4854] __se_sys_perf_event_open+0xb12/0x3c30 [ 118.767340][ T4854] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 118.772807][ T4854] ? __ia32_sys_read+0x90/0x90 [ 118.777407][ T4854] __x64_sys_perf_event_open+0xbf/0xd0 [ 118.782786][ T4854] do_syscall_64+0x34/0x70 [ 118.787045][ T4854] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 118.792772][ T4854] RIP: 0033:0x7f20d0f53819 [ 118.797021][ T4854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 118.816773][ T4854] RSP: 002b:00007f20cf5cc038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 118.825036][ T4854] RAX: ffffffffffffffda RBX: 00007f20d110afa0 RCX: 00007f20d0f53819 [ 118.832822][ T4854] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001080 [ 118.840814][ T4854] RBP: 00007f20cf5cc090 R08: 0000000000000000 R09: 0000000000000000 [ 118.848625][ T4854] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 118.856535][ T4854] R13: 0000000000000000 R14: 00007f20d110afa0 R15: 00007ffdd83d6e98 [ 118.876578][ T4854] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 119.009008][ T4860] device syzkaller0 entered promiscuous mode [ 119.252910][ T4888] FAULT_INJECTION: forcing a failure. [ 119.252910][ T4888] name failslab, interval 1, probability 0, space 0, times 0 [ 119.266072][ T4888] CPU: 1 PID: 4888 Comm: syz.5.1374 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 119.277177][ T4888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 119.287090][ T4888] Call Trace: [ 119.290368][ T4888] dump_stack_lvl+0x1e2/0x24b [ 119.294888][ T4888] ? bfq_pos_tree_add_move+0x43b/0x43b [ 119.300176][ T4888] dump_stack+0x15/0x17 [ 119.304165][ T4888] should_fail+0x3c6/0x510 [ 119.308418][ T4888] ? trace_probe_init+0x58/0x390 [ 119.313191][ T4888] __should_failslab+0xa4/0xe0 [ 119.317792][ T4888] should_failslab+0x9/0x20 [ 119.322136][ T4888] __kmalloc+0x60/0x330 [ 119.326125][ T4888] trace_probe_init+0x58/0x390 [ 119.330731][ T4888] ? __kasan_kmalloc+0x9/0x10 [ 119.335237][ T4888] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 119.340641][ T4888] ? create_local_trace_uprobe+0x167/0x6f0 [ 119.346282][ T4888] create_local_trace_uprobe+0x192/0x6f0 [ 119.351736][ T4888] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 119.356958][ T4888] ? _copy_from_user+0x96/0xd0 [ 119.361556][ T4888] perf_uprobe_init+0xfa/0x1a0 [ 119.366270][ T4888] perf_uprobe_event_init+0x106/0x190 [ 119.371468][ T4888] perf_try_init_event+0x143/0x410 [ 119.376423][ T4888] perf_event_alloc+0xcf5/0x1970 [ 119.381203][ T4888] __se_sys_perf_event_open+0xb12/0x3c30 [ 119.386750][ T4888] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 119.392214][ T4888] ? __ia32_sys_read+0x90/0x90 [ 119.396819][ T4888] __x64_sys_perf_event_open+0xbf/0xd0 [ 119.402301][ T4888] do_syscall_64+0x34/0x70 [ 119.406560][ T4888] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 119.412273][ T4888] RIP: 0033:0x7eff85818819 [ 119.416527][ T4888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 119.437560][ T4888] RSP: 002b:00007eff83e91038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 119.445983][ T4888] RAX: ffffffffffffffda RBX: 00007eff859cffa0 RCX: 00007eff85818819 [ 119.453871][ T4888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001080 [ 119.461683][ T4888] RBP: 00007eff83e91090 R08: 0000000000000000 R09: 0000000000000000 [ 119.469781][ T4888] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 119.477600][ T4888] R13: 0000000000000000 R14: 00007eff859cffa0 R15: 00007ffee183bff8 [ 119.486912][ T4888] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 119.551181][ T4897] device syzkaller0 entered promiscuous mode [ 119.726488][ T4909] device pim6reg1 entered promiscuous mode [ 119.785561][ T4911] device syzkaller0 entered promiscuous mode [ 120.150612][ T4925] FAULT_INJECTION: forcing a failure. [ 120.150612][ T4925] name failslab, interval 1, probability 0, space 0, times 0 [ 120.191700][ T4925] CPU: 1 PID: 4925 Comm: syz.5.1385 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 120.202808][ T4925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 120.212779][ T4925] Call Trace: [ 120.215915][ T4925] dump_stack_lvl+0x1e2/0x24b [ 120.220512][ T4925] ? panic+0x812/0x812 [ 120.224424][ T4925] ? bfq_pos_tree_add_move+0x43b/0x43b [ 120.229717][ T4925] dump_stack+0x15/0x17 [ 120.233708][ T4925] should_fail+0x3c6/0x510 [ 120.237958][ T4925] ? trace_probe_init+0x2c1/0x390 [ 120.242918][ T4925] __should_failslab+0xa4/0xe0 [ 120.247518][ T4925] should_failslab+0x9/0x20 [ 120.251857][ T4925] __kmalloc_track_caller+0x5f/0x320 [ 120.256975][ T4925] ? __kasan_kmalloc+0x9/0x10 [ 120.261492][ T4925] kstrdup+0x34/0x70 [ 120.265218][ T4925] trace_probe_init+0x2c1/0x390 [ 120.269909][ T4925] create_local_trace_uprobe+0x192/0x6f0 [ 120.275376][ T4925] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 120.280497][ T4925] ? _copy_from_user+0x96/0xd0 [ 120.285098][ T4925] perf_uprobe_init+0xfa/0x1a0 [ 120.289699][ T4925] perf_uprobe_event_init+0x106/0x190 [ 120.294995][ T4925] perf_try_init_event+0x143/0x410 [ 120.299949][ T4925] perf_event_alloc+0xcf5/0x1970 [ 120.305070][ T4925] __se_sys_perf_event_open+0xb12/0x3c30 [ 120.310532][ T4925] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 120.316014][ T4925] ? __ia32_sys_read+0x90/0x90 [ 120.320631][ T4925] __x64_sys_perf_event_open+0xbf/0xd0 [ 120.325895][ T4925] do_syscall_64+0x34/0x70 [ 120.330147][ T4925] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 120.336138][ T4925] RIP: 0033:0x7eff85818819 [ 120.340392][ T4925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 120.360010][ T4925] RSP: 002b:00007eff83e91038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 120.368334][ T4925] RAX: ffffffffffffffda RBX: 00007eff859cffa0 RCX: 00007eff85818819 [ 120.376158][ T4925] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001080 [ 120.384123][ T4925] RBP: 00007eff83e91090 R08: 0000000000000000 R09: 0000000000000000 [ 120.392023][ T4925] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 120.399831][ T4925] R13: 0000000000000000 R14: 00007eff859cffa0 R15: 00007ffee183bff8 [ 120.439758][ T4925] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 120.778116][ T4961] device wg2 left promiscuous mode [ 121.250220][ T5003] FAULT_INJECTION: forcing a failure. [ 121.250220][ T5003] name failslab, interval 1, probability 0, space 0, times 0 [ 121.319802][ T5003] CPU: 1 PID: 5003 Comm: syz.7.1408 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 121.330915][ T5003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 121.340812][ T5003] Call Trace: [ 121.343939][ T5003] dump_stack_lvl+0x1e2/0x24b [ 121.348534][ T5003] ? panic+0x812/0x812 [ 121.352444][ T5003] ? bfq_pos_tree_add_move+0x43b/0x43b [ 121.357742][ T5003] dump_stack+0x15/0x17 [ 121.361735][ T5003] should_fail+0x3c6/0x510 [ 121.365982][ T5003] ? trace_probe_init+0x2f4/0x390 [ 121.370931][ T5003] __should_failslab+0xa4/0xe0 [ 121.375529][ T5003] should_failslab+0x9/0x20 [ 121.379960][ T5003] __kmalloc_track_caller+0x5f/0x320 [ 121.385170][ T5003] kstrdup+0x34/0x70 [ 121.388900][ T5003] trace_probe_init+0x2f4/0x390 [ 121.393592][ T5003] create_local_trace_uprobe+0x192/0x6f0 [ 121.399201][ T5003] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 121.404281][ T5003] ? _copy_from_user+0x96/0xd0 [ 121.408885][ T5003] perf_uprobe_init+0xfa/0x1a0 [ 121.413483][ T5003] perf_uprobe_event_init+0x106/0x190 [ 121.418680][ T5003] perf_try_init_event+0x143/0x410 [ 121.423641][ T5003] perf_event_alloc+0xcf5/0x1970 [ 121.428407][ T5003] __se_sys_perf_event_open+0xb12/0x3c30 [ 121.433968][ T5003] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 121.439601][ T5003] ? __ia32_sys_read+0x90/0x90 [ 121.444397][ T5003] __x64_sys_perf_event_open+0xbf/0xd0 [ 121.449859][ T5003] do_syscall_64+0x34/0x70 [ 121.454123][ T5003] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 121.459839][ T5003] RIP: 0033:0x7f0246e8a819 [ 121.464087][ T5003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.484446][ T5003] RSP: 002b:00007f0245503038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 121.492780][ T5003] RAX: ffffffffffffffda RBX: 00007f0247041fa0 RCX: 00007f0246e8a819 [ 121.500585][ T5003] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001080 [ 121.508395][ T5003] RBP: 00007f0245503090 R08: 0000000000000000 R09: 0000000000000000 [ 121.516215][ T5003] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 121.524020][ T5003] R13: 0000000000000000 R14: 00007f0247041fa0 R15: 00007ffeb408b608 [ 121.536949][ T5003] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 121.587852][ T5013] device pim6reg1 entered promiscuous mode [ 122.178937][ T5059] FAULT_INJECTION: forcing a failure. [ 122.178937][ T5059] name failslab, interval 1, probability 0, space 0, times 0 [ 122.211478][ T5059] CPU: 1 PID: 5059 Comm: syz.7.1423 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 122.222580][ T5059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 122.232477][ T5059] Call Trace: [ 122.235607][ T5059] dump_stack_lvl+0x1e2/0x24b [ 122.240111][ T5059] ? panic+0x812/0x812 [ 122.244061][ T5059] ? bfq_pos_tree_add_move+0x43b/0x43b [ 122.249323][ T5059] ? slab_post_alloc_hook+0x80/0x2f0 [ 122.254447][ T5059] ? trace_probe_init+0x2f4/0x390 [ 122.259297][ T5059] dump_stack+0x15/0x17 [ 122.263288][ T5059] should_fail+0x3c6/0x510 [ 122.267806][ T5059] ? create_local_trace_uprobe+0x441/0x6f0 [ 122.273534][ T5059] __should_failslab+0xa4/0xe0 [ 122.278139][ T5059] should_failslab+0x9/0x20 [ 122.282482][ T5059] __kmalloc_track_caller+0x5f/0x320 [ 122.287615][ T5059] ? trace_probe_init+0x35a/0x390 [ 122.292462][ T5059] ? create_local_trace_uprobe+0x419/0x6f0 [ 122.298109][ T5059] kstrdup+0x34/0x70 [ 122.301827][ T5059] create_local_trace_uprobe+0x441/0x6f0 [ 122.307300][ T5059] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 122.312419][ T5059] ? _copy_from_user+0x96/0xd0 [ 122.317105][ T5059] perf_uprobe_init+0xfa/0x1a0 [ 122.321713][ T5059] perf_uprobe_event_init+0x106/0x190 [ 122.327178][ T5059] perf_try_init_event+0x143/0x410 [ 122.332153][ T5059] perf_event_alloc+0xcf5/0x1970 [ 122.337119][ T5059] __se_sys_perf_event_open+0xb12/0x3c30 [ 122.342541][ T5059] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 122.348097][ T5059] ? __ia32_sys_read+0x90/0x90 [ 122.352695][ T5059] __x64_sys_perf_event_open+0xbf/0xd0 [ 122.357991][ T5059] do_syscall_64+0x34/0x70 [ 122.362347][ T5059] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 122.368076][ T5059] RIP: 0033:0x7f0246e8a819 [ 122.372308][ T5059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 122.391839][ T5059] RSP: 002b:00007f0245503038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 122.400083][ T5059] RAX: ffffffffffffffda RBX: 00007f0247041fa0 RCX: 00007f0246e8a819 [ 122.407894][ T5059] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001080 [ 122.415714][ T5059] RBP: 00007f0245503090 R08: 0000000000000000 R09: 0000000000000000 [ 122.423516][ T5059] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 122.431342][ T5059] R13: 0000000000000000 R14: 00007f0247041fa0 R15: 00007ffeb408b608 [ 123.756630][ T5119] device syzkaller0 entered promiscuous mode [ 123.948538][ T5141] device pim6reg1 entered promiscuous mode [ 124.027286][ T5148] device sit0 entered promiscuous mode [ 124.059559][ T5146] device pim6reg1 entered promiscuous mode [ 124.242342][ T5170] device pim6reg1 entered promiscuous mode [ 124.474011][ T5194] device syzkaller0 entered promiscuous mode [ 125.326115][ T5290] device sit0 left promiscuous mode [ 125.474891][ T5305] device sit0 entered promiscuous mode [ 125.593163][ T24] audit: type=1400 audit(1732384812.630:170): avc: denied { create } for pid=5312 comm="syz.0.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 125.998824][ T5356] device pim6reg1 entered promiscuous mode [ 126.345023][ T5391] device pim6reg1 entered promiscuous mode [ 127.020630][ T5401] device bridge_slave_1 left promiscuous mode [ 127.272149][ T5401] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.401450][ T5401] device bridge_slave_0 left promiscuous mode [ 127.522809][ T5401] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.868633][ T5492] geneve1: tun_chr_ioctl cmd 1074025681 [ 128.910995][ T5491] geneve1: tun_chr_ioctl cmd 1074025673 [ 129.222149][ T5514] device sit0 left promiscuous mode [ 129.265961][ T5516] device sit0 entered promiscuous mode [ 129.676128][ T5538] device pim6reg1 entered promiscuous mode [ 130.727961][ T5605] device syzkaller0 entered promiscuous mode [ 130.756511][ T5606] device syzkaller0 entered promiscuous mode [ 131.183892][ T5649] device pim6reg1 entered promiscuous mode [ 131.386784][ T5673] device sit0 left promiscuous mode [ 131.406581][ T5673] device sit0 entered promiscuous mode [ 132.734148][ T24] audit: type=1400 audit(1732384819.780:171): avc: denied { attach_queue } for pid=5753 comm="syz.7.1628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 132.904391][ T5766] device macsec0 entered promiscuous mode [ 132.976914][ T5774] FAULT_INJECTION: forcing a failure. [ 132.976914][ T5774] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 132.989931][ T5774] CPU: 1 PID: 5774 Comm: syz.5.1636 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 133.001255][ T5774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 133.011144][ T5774] Call Trace: [ 133.014275][ T5774] dump_stack_lvl+0x1e2/0x24b [ 133.018783][ T5774] ? panic+0x812/0x812 [ 133.022687][ T5774] ? bfq_pos_tree_add_move+0x43b/0x43b [ 133.027980][ T5774] ? arch_stack_walk+0xf3/0x140 [ 133.032783][ T5774] dump_stack+0x15/0x17 [ 133.036748][ T5774] should_fail+0x3c6/0x510 [ 133.041026][ T5774] should_fail_usercopy+0x1a/0x20 [ 133.045997][ T5774] strncpy_from_user+0x24/0x2d0 [ 133.050991][ T5774] ? htab_map_hash+0x356/0x7e0 [ 133.055556][ T5774] strncpy_from_user_nofault+0x73/0x150 [ 133.060936][ T5774] bpf_probe_read_user_str+0x2a/0x70 [ 133.066067][ T5774] bpf_prog_d944b8c152a67c20+0x72/0xe80 [ 133.071437][ T5774] bpf_trace_run3+0x121/0x2c0 [ 133.075952][ T5774] ? bpf_trace_run2+0x280/0x280 [ 133.080640][ T5774] ? _raw_spin_lock+0xa4/0x1b0 [ 133.085235][ T5774] ? _raw_spin_trylock_bh+0x190/0x190 [ 133.090535][ T5774] __bpf_trace_workqueue_queue_work+0x2b/0x40 [ 133.096620][ T5774] __queue_work+0xbc3/0xd10 [ 133.100958][ T5774] queue_work_on+0x105/0x160 [ 133.105393][ T5774] ? wq_worker_last_func+0x50/0x50 [ 133.110517][ T5774] ? __kasan_check_write+0x14/0x20 [ 133.115742][ T5774] synchronize_rcu_expedited+0x45b/0x660 [ 133.121572][ T5774] ? synchronize_rcu+0x120/0x120 [ 133.126331][ T5774] ? rcu_exp_handler+0x360/0x360 [ 133.131186][ T5774] ? 0xffffffffa0010000 [ 133.135351][ T5774] ? is_bpf_text_address+0x172/0x190 [ 133.140563][ T5774] ? stack_trace_save+0x1c0/0x1c0 [ 133.145540][ T5774] ? __kernel_text_address+0x9b/0x110 [ 133.151035][ T5774] ? unwind_get_return_address+0x4d/0x90 [ 133.156452][ T5774] ? arch_stack_walk+0xf3/0x140 [ 133.161489][ T5774] synchronize_rcu+0x88/0x120 [ 133.165998][ T5774] ? kvfree_call_rcu+0x650/0x650 [ 133.170787][ T5774] ? __kasan_check_write+0x14/0x20 [ 133.175726][ T5774] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 133.180765][ T5774] ? _raw_spin_lock_irqsave+0x210/0x210 [ 133.186146][ T5774] rcu_sync_enter+0x1e0/0x330 [ 133.190832][ T5774] ? rcu_sync_enter_start+0x70/0x70 [ 133.195944][ T5774] ? probe_event_enable+0x3e2/0xbe0 [ 133.201075][ T5774] ? trace_uprobe_register+0x90/0x590 [ 133.206277][ T5774] ? perf_trace_event_init+0x4a0/0x950 [ 133.211579][ T5774] ? perf_uprobe_init+0x132/0x1a0 [ 133.216518][ T5774] ? perf_uprobe_event_init+0x106/0x190 [ 133.221894][ T5774] ? perf_try_init_event+0x143/0x410 [ 133.227115][ T5774] ? perf_event_alloc+0xcf5/0x1970 [ 133.232047][ T5774] ? __se_sys_perf_event_open+0xb12/0x3c30 [ 133.237876][ T5774] ? __x64_sys_perf_event_open+0xbf/0xd0 [ 133.243415][ T5774] ? do_syscall_64+0x34/0x70 [ 133.247842][ T5774] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 133.253835][ T5774] percpu_down_write+0x72/0x370 [ 133.258527][ T5774] ? __percpu_down_read+0x110/0x110 [ 133.263902][ T5774] register_for_each_vma+0x35/0xbd0 [ 133.268964][ T5774] ? __kasan_check_write+0x14/0x20 [ 133.273963][ T5774] ? down_write+0xd7/0x150 [ 133.278222][ T5774] ? down_read_killable+0x220/0x220 [ 133.283345][ T5774] ? __kasan_check_write+0x14/0x20 [ 133.288289][ T5774] __uprobe_register+0x568/0x7f0 [ 133.293082][ T5774] uprobe_register_refctr+0x2d/0x40 [ 133.298107][ T5774] probe_event_enable+0x3e2/0xbe0 [ 133.302966][ T5774] ? __uprobe_trace_func+0x750/0x750 [ 133.308083][ T5774] trace_uprobe_register+0x90/0x590 [ 133.313116][ T5774] ? find_next_bit+0xc7/0x100 [ 133.317625][ T5774] ? cpumask_next+0x11/0x30 [ 133.322115][ T5774] perf_trace_event_init+0x4a0/0x950 [ 133.327274][ T5774] perf_uprobe_init+0x132/0x1a0 [ 133.331979][ T5774] perf_uprobe_event_init+0x106/0x190 [ 133.337188][ T5774] perf_try_init_event+0x143/0x410 [ 133.342197][ T5774] perf_event_alloc+0xcf5/0x1970 [ 133.346987][ T5774] __se_sys_perf_event_open+0xb12/0x3c30 [ 133.352549][ T5774] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 133.358032][ T5774] ? __ia32_sys_read+0x90/0x90 [ 133.362729][ T5774] __x64_sys_perf_event_open+0xbf/0xd0 [ 133.367997][ T5774] do_syscall_64+0x34/0x70 [ 133.372251][ T5774] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 133.377984][ T5774] RIP: 0033:0x7eff85818819 [ 133.382243][ T5774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.401953][ T5774] RSP: 002b:00007eff83e91038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 133.410638][ T5774] RAX: ffffffffffffffda RBX: 00007eff859cffa0 RCX: 00007eff85818819 [ 133.418466][ T5774] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001080 [ 133.426277][ T5774] RBP: 00007eff83e91090 R08: 0000000000000000 R09: 0000000000000000 [ 133.434224][ T5774] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 133.442003][ T5774] R13: 0000000000000000 R14: 00007eff859cffa0 R15: 00007ffee183bff8 [ 133.726203][ T5800] veth0_vlan: mtu greater than device maximum [ 133.788461][ T5803] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.795599][ T5803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.804220][ T5803] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.811248][ T5803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.823437][ T5803] device bridge0 entered promiscuous mode [ 133.850740][ T5809] FAULT_INJECTION: forcing a failure. [ 133.850740][ T5809] name failslab, interval 1, probability 0, space 0, times 0 [ 133.883165][ T5804] device pim6reg1 entered promiscuous mode [ 133.889997][ T5809] CPU: 1 PID: 5809 Comm: syz.5.1648 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 133.901785][ T5809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 133.911985][ T5809] Call Trace: [ 133.915090][ T5809] dump_stack_lvl+0x1e2/0x24b [ 133.919580][ T5809] ? bfq_pos_tree_add_move+0x43b/0x43b [ 133.925148][ T5809] dump_stack+0x15/0x17 [ 133.929068][ T5809] should_fail+0x3c6/0x510 [ 133.933317][ T5809] ? selinux_perf_event_alloc+0x51/0x140 [ 133.938792][ T5809] __should_failslab+0xa4/0xe0 [ 133.943404][ T5809] should_failslab+0x9/0x20 [ 133.947808][ T5809] kmem_cache_alloc_trace+0x3a/0x2e0 [ 133.952934][ T5809] selinux_perf_event_alloc+0x51/0x140 [ 133.958262][ T5809] security_perf_event_alloc+0x62/0x90 [ 133.963530][ T5809] perf_event_alloc+0x15b6/0x1970 [ 133.968613][ T5809] __se_sys_perf_event_open+0xb12/0x3c30 [ 133.974150][ T5809] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 133.979612][ T5809] ? __ia32_sys_read+0x90/0x90 [ 133.984226][ T5809] __x64_sys_perf_event_open+0xbf/0xd0 [ 133.989605][ T5809] do_syscall_64+0x34/0x70 [ 133.994552][ T5809] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 134.000251][ T5809] RIP: 0033:0x7eff85818819 [ 134.004600][ T5809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.024037][ T5809] RSP: 002b:00007eff83e91038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 134.032388][ T5809] RAX: ffffffffffffffda RBX: 00007eff859cffa0 RCX: 00007eff85818819 [ 134.040627][ T5809] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001080 [ 134.048609][ T5809] RBP: 00007eff83e91090 R08: 0000000000000000 R09: 0000000000000000 [ 134.056408][ T5809] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 134.064317][ T5809] R13: 0000000000000000 R14: 00007eff859cffa0 R15: 00007ffee183bff8 [ 134.508213][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 135.004031][ T5885] tap0: tun_chr_ioctl cmd 1074025692 [ 135.304038][ T5904] device pim6reg1 entered promiscuous mode [ 135.421772][ T5938] device syzkaller0 entered promiscuous mode [ 135.865752][ T24] audit: type=1400 audit(1732384822.910:172): avc: denied { create } for pid=5986 comm="syz.6.1697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 135.987760][ T6004] device sit0 left promiscuous mode [ 136.507327][ T6018] device syzkaller0 entered promiscuous mode [ 136.683654][ T6032] device pim6reg1 entered promiscuous mode [ 137.137635][ T6055] device syzkaller0 entered promiscuous mode [ 138.394456][ T6137] device syzkaller0 entered promiscuous mode [ 139.390429][ T383] device bridge_slave_1 left promiscuous mode [ 139.396416][ T383] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.403697][ T383] device bridge_slave_0 left promiscuous mode [ 139.410231][ T383] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.418340][ T383] device bridge_slave_1 left promiscuous mode [ 139.424582][ T383] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.432041][ T383] device bridge_slave_0 left promiscuous mode [ 139.438169][ T383] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.446711][ T383] device veth1_macvtap left promiscuous mode [ 139.453003][ T383] device veth0_vlan left promiscuous mode [ 139.459752][ T383] device veth1_macvtap left promiscuous mode [ 139.465575][ T383] device veth0_vlan left promiscuous mode [ 141.069190][ T6203] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.076198][ T6203] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.083796][ T6203] device bridge_slave_0 entered promiscuous mode [ 141.093072][ T6203] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.100061][ T6203] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.107082][ T6203] device bridge_slave_1 entered promiscuous mode [ 141.132339][ T6203] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.139266][ T6203] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.146617][ T6203] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.153464][ T6203] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.162074][ T383] device bridge_slave_1 left promiscuous mode [ 141.168323][ T383] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.175953][ T383] device bridge_slave_0 left promiscuous mode [ 141.182155][ T383] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.190089][ T383] device veth1_macvtap left promiscuous mode [ 141.195976][ T383] device veth0_vlan left promiscuous mode [ 141.201749][ T383] device veth0_vlan left promiscuous mode [ 141.360553][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.368117][ T111] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.375171][ T111] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.384588][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.392823][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.399886][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.409425][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.417854][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.424869][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.435736][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.444982][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.457213][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.468019][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.476239][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.484233][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.492346][ T6203] device veth0_vlan entered promiscuous mode [ 141.501499][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 141.510714][ T6203] device veth1_macvtap entered promiscuous mode [ 141.519052][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 141.529466][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 142.635354][ T6217] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.642505][ T6217] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.649561][ T6217] device bridge_slave_0 entered promiscuous mode [ 142.662405][ T6217] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.669335][ T6217] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.676690][ T6217] device bridge_slave_1 entered promiscuous mode [ 142.700200][ T6218] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.707044][ T6218] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.714347][ T6218] device bridge_slave_0 entered promiscuous mode [ 142.723197][ T6218] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.730187][ T6218] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.737368][ T6218] device bridge_slave_1 entered promiscuous mode [ 142.820788][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.828241][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.839533][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.847120][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.854494][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.862975][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.871233][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.878133][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.890827][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 142.898151][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.906197][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.914346][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.921313][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.928566][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.936859][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.944938][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.952029][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.959262][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.967115][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.975292][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.983513][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.990457][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.997735][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 143.016378][ T6217] device veth0_vlan entered promiscuous mode [ 143.022643][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 143.031081][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.039009][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.046473][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.053983][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.061776][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.069433][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.085666][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.095148][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 143.104327][ T6217] device veth1_macvtap entered promiscuous mode [ 143.117898][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.126188][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.133541][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.141127][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.149143][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.158606][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.167432][ T6218] device veth0_vlan entered promiscuous mode [ 143.191545][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.201365][ T6218] device veth1_macvtap entered promiscuous mode [ 143.211091][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.222226][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.621358][ T6235] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.628381][ T6235] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.636006][ T6235] device bridge_slave_0 entered promiscuous mode [ 143.643191][ T6235] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.651048][ T6235] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.663022][ T6235] device bridge_slave_1 entered promiscuous mode [ 144.004281][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.016332][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.057480][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.089451][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.114406][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.121400][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.156117][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.177466][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.201147][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.208040][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.244546][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.258749][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.274702][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.296814][ T6235] device veth0_vlan entered promiscuous mode [ 144.325890][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 144.344681][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.374899][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.399793][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.437323][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 144.446346][ T6235] device veth1_macvtap entered promiscuous mode [ 144.473170][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 144.487164][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 144.528543][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 144.582168][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 145.641220][ T6344] device pim6reg1 entered promiscuous mode [ 145.909679][ T6365] device bridge_slave_1 left promiscuous mode [ 145.915886][ T6365] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.005141][ T6365] device bridge_slave_0 left promiscuous mode [ 146.011362][ T6365] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.431417][ T6391] device bridge_slave_0 entered promiscuous mode [ 146.708087][ T6420] FAULT_INJECTION: forcing a failure. [ 146.708087][ T6420] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 146.763828][ T6420] CPU: 1 PID: 6420 Comm: syz.1.1809 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 146.775631][ T6420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 146.785621][ T6420] Call Trace: [ 146.788754][ T6420] dump_stack_lvl+0x1e2/0x24b [ 146.793263][ T6420] ? bfq_pos_tree_add_move+0x43b/0x43b [ 146.798556][ T6420] ? kmem_cache_free+0xa9/0x1e0 [ 146.803244][ T6420] dump_stack+0x15/0x17 [ 146.807318][ T6420] should_fail+0x3c6/0x510 [ 146.811580][ T6420] should_fail_usercopy+0x1a/0x20 [ 146.816436][ T6420] _copy_from_user+0x20/0xd0 [ 146.820887][ T6420] __copy_msghdr_from_user+0xaf/0x7c0 [ 146.826365][ T6420] ? __ia32_sys_shutdown+0x70/0x70 [ 146.831301][ T6420] ___sys_sendmsg+0x166/0x2e0 [ 146.835889][ T6420] ? __sys_sendmsg+0x280/0x280 [ 146.840586][ T6420] ? rw_verify_area+0x1c3/0x360 [ 146.845466][ T6420] ? __fdget+0x1bc/0x240 [ 146.849533][ T6420] __se_sys_sendmsg+0x1b1/0x280 [ 146.854212][ T6420] ? __x64_sys_sendmsg+0x90/0x90 [ 146.858977][ T6420] ? ksys_write+0x260/0x2c0 [ 146.863438][ T6420] ? debug_smp_processor_id+0x17/0x20 [ 146.868624][ T6420] __x64_sys_sendmsg+0x7b/0x90 [ 146.873219][ T6420] do_syscall_64+0x34/0x70 [ 146.877479][ T6420] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 146.883281][ T6420] RIP: 0033:0x7f8404050819 [ 146.887646][ T6420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.907097][ T6420] RSP: 002b:00007f84026c9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 146.915331][ T6420] RAX: ffffffffffffffda RBX: 00007f8404207fa0 RCX: 00007f8404050819 [ 146.923207][ T6420] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 146.931151][ T6420] RBP: 00007f84026c9090 R08: 0000000000000000 R09: 0000000000000000 [ 146.939021][ T6420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.946844][ T6420] R13: 0000000000000000 R14: 00007f8404207fa0 R15: 00007fff2f7dbd98 [ 147.478104][ T6438] device wg2 entered promiscuous mode [ 148.833013][ T6508] FAULT_INJECTION: forcing a failure. [ 148.833013][ T6508] name failslab, interval 1, probability 0, space 0, times 0 [ 148.867295][ T6508] CPU: 0 PID: 6508 Comm: syz.3.1833 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 148.879409][ T6508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 148.889272][ T6508] Call Trace: [ 148.892663][ T6508] dump_stack_lvl+0x1e2/0x24b [ 148.897356][ T6508] ? panic+0x812/0x812 [ 148.901230][ T6508] ? bfq_pos_tree_add_move+0x43b/0x43b [ 148.907083][ T6508] ? arch_stack_walk+0xf3/0x140 [ 148.911765][ T6508] dump_stack+0x15/0x17 [ 148.915749][ T6508] should_fail+0x3c6/0x510 [ 148.920103][ T6508] ? __alloc_skb+0x80/0x510 [ 148.924598][ T6508] __should_failslab+0xa4/0xe0 [ 148.929191][ T6508] should_failslab+0x9/0x20 [ 148.933651][ T6508] kmem_cache_alloc+0x3d/0x2e0 [ 148.938275][ T6508] __alloc_skb+0x80/0x510 [ 148.942618][ T6508] tipc_msg_build+0x13e/0x1040 [ 148.947248][ T6508] ? proc_pident_instantiate+0x7a/0x2e0 [ 148.952772][ T6508] ? proc_pident_lookup+0x1c4/0x260 [ 148.957787][ T6508] ? tipc_node_find+0x206/0x4c0 [ 148.962469][ T6508] ? tipc_msg_fragment+0x760/0x760 [ 148.967421][ T6508] ? tipc_node_get_mtu+0x20f/0x2b0 [ 148.972491][ T6508] __tipc_sendmsg+0x19fb/0x3ab0 [ 148.977160][ T6508] ? tipc_sk_publish+0x3e0/0x3e0 [ 148.981949][ T6508] ? avc_has_perm+0x14d/0x400 [ 148.986445][ T6508] ? memcpy+0x56/0x70 [ 148.990270][ T6508] ? avc_has_perm+0x275/0x400 [ 148.994939][ T6508] ? avc_has_perm_noaudit+0x240/0x240 [ 149.000425][ T6508] ? unwind_get_return_address+0x4d/0x90 [ 149.005879][ T6508] ? __kasan_check_write+0x14/0x20 [ 149.010830][ T6508] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 149.015823][ T6508] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 149.020893][ T6508] ? __local_bh_enable_ip+0x53/0x80 [ 149.025943][ T6508] ? local_bh_enable+0x1f/0x30 [ 149.030652][ T6508] ? lock_sock_nested+0x26a/0x300 [ 149.035596][ T6508] ? sock_init_data+0xc0/0xc0 [ 149.040102][ T6508] ? wait_woken+0x250/0x250 [ 149.044451][ T6508] ? kmem_cache_free+0xa9/0x1e0 [ 149.049233][ T6508] ? check_stack_object+0x114/0x130 [ 149.054250][ T6508] tipc_sendmsg+0x55/0x70 [ 149.058419][ T6508] ? tipc_recvmsg+0x13b0/0x13b0 [ 149.063192][ T6508] ____sys_sendmsg+0x59e/0x8f0 [ 149.067795][ T6508] ? __sys_sendmsg_sock+0x40/0x40 [ 149.072654][ T6508] ? import_iovec+0xe5/0x120 [ 149.077080][ T6508] ___sys_sendmsg+0x252/0x2e0 [ 149.081617][ T6508] ? __sys_sendmsg+0x280/0x280 [ 149.086212][ T6508] ? rw_verify_area+0x1c3/0x360 [ 149.090891][ T6508] ? __fdget+0x1bc/0x240 [ 149.094963][ T6508] __se_sys_sendmsg+0x1b1/0x280 [ 149.099651][ T6508] ? __x64_sys_sendmsg+0x90/0x90 [ 149.104420][ T6508] ? ksys_write+0x260/0x2c0 [ 149.108810][ T6508] ? debug_smp_processor_id+0x17/0x20 [ 149.113988][ T6508] __x64_sys_sendmsg+0x7b/0x90 [ 149.118842][ T6508] do_syscall_64+0x34/0x70 [ 149.123084][ T6508] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 149.129017][ T6508] RIP: 0033:0x7f0c635fc819 [ 149.133246][ T6508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.153300][ T6508] RSP: 002b:00007f0c61c75038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 149.161633][ T6508] RAX: ffffffffffffffda RBX: 00007f0c637b3fa0 RCX: 00007f0c635fc819 [ 149.169612][ T6508] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 149.177514][ T6508] RBP: 00007f0c61c75090 R08: 0000000000000000 R09: 0000000000000000 [ 149.185407][ T6508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.193308][ T6508] R13: 0000000000000000 R14: 00007f0c637b3fa0 R15: 00007ffde1ea62f8 [ 149.435097][ T6590] device syzkaller0 entered promiscuous mode [ 149.465254][ T6594] device pim6reg1 entered promiscuous mode [ 149.663957][ T6601] FAULT_INJECTION: forcing a failure. [ 149.663957][ T6601] name failslab, interval 1, probability 0, space 0, times 0 [ 149.721034][ T6601] CPU: 0 PID: 6601 Comm: syz.1.1849 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 149.732318][ T6601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 149.742385][ T6601] Call Trace: [ 149.745534][ T6601] dump_stack_lvl+0x1e2/0x24b [ 149.750114][ T6601] ? panic+0x812/0x812 [ 149.754026][ T6601] ? bfq_pos_tree_add_move+0x43b/0x43b [ 149.759317][ T6601] dump_stack+0x15/0x17 [ 149.763304][ T6601] should_fail+0x3c6/0x510 [ 149.767561][ T6601] ? tipc_msg_build+0x13e/0x1040 [ 149.772337][ T6601] __should_failslab+0xa4/0xe0 [ 149.776942][ T6601] should_failslab+0x9/0x20 [ 149.781278][ T6601] __kmalloc_track_caller+0x5f/0x320 [ 149.786396][ T6601] ? kmem_cache_alloc+0x168/0x2e0 [ 149.791264][ T6601] ? __alloc_skb+0x80/0x510 [ 149.795599][ T6601] ? tipc_msg_build+0x13e/0x1040 [ 149.800377][ T6601] __alloc_skb+0xbc/0x510 [ 149.804542][ T6601] tipc_msg_build+0x13e/0x1040 [ 149.809139][ T6601] ? proc_pident_instantiate+0x7a/0x2e0 [ 149.814524][ T6601] ? proc_pident_lookup+0x1c4/0x260 [ 149.819562][ T6601] ? tipc_node_find+0x206/0x4c0 [ 149.824318][ T6601] ? tipc_msg_fragment+0x760/0x760 [ 149.829588][ T6601] ? tipc_node_get_mtu+0x20f/0x2b0 [ 149.834620][ T6601] __tipc_sendmsg+0x19fb/0x3ab0 [ 149.839293][ T6601] ? tipc_sk_publish+0x3e0/0x3e0 [ 149.844056][ T6601] ? avc_has_perm+0x14d/0x400 [ 149.848571][ T6601] ? memcpy+0x56/0x70 [ 149.852402][ T6601] ? avc_has_perm+0x275/0x400 [ 149.857008][ T6601] ? avc_has_perm_noaudit+0x240/0x240 [ 149.862296][ T6601] ? unwind_get_return_address+0x4d/0x90 [ 149.867752][ T6601] ? __kasan_check_write+0x14/0x20 [ 149.872701][ T6601] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 149.877836][ T6601] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 149.882892][ T6601] ? __local_bh_enable_ip+0x53/0x80 [ 149.887899][ T6601] ? local_bh_enable+0x1f/0x30 [ 149.892583][ T6601] ? lock_sock_nested+0x26a/0x300 [ 149.897449][ T6601] ? sock_init_data+0xc0/0xc0 [ 149.901957][ T6601] ? wait_woken+0x250/0x250 [ 149.906293][ T6601] ? kmem_cache_free+0xa9/0x1e0 [ 149.911163][ T6601] ? check_stack_object+0x114/0x130 [ 149.916190][ T6601] tipc_sendmsg+0x55/0x70 [ 149.920357][ T6601] ? tipc_recvmsg+0x13b0/0x13b0 [ 149.925036][ T6601] ____sys_sendmsg+0x59e/0x8f0 [ 149.929639][ T6601] ? __sys_sendmsg_sock+0x40/0x40 [ 149.934589][ T6601] ? import_iovec+0xe5/0x120 [ 149.939020][ T6601] ___sys_sendmsg+0x252/0x2e0 [ 149.943566][ T6601] ? __sys_sendmsg+0x280/0x280 [ 149.948319][ T6601] ? rw_verify_area+0x1c3/0x360 [ 149.953002][ T6601] ? __fdget+0x1bc/0x240 [ 149.957167][ T6601] __se_sys_sendmsg+0x1b1/0x280 [ 149.961846][ T6601] ? __x64_sys_sendmsg+0x90/0x90 [ 149.966701][ T6601] ? ksys_write+0x260/0x2c0 [ 149.971062][ T6601] ? debug_smp_processor_id+0x17/0x20 [ 149.976348][ T6601] __x64_sys_sendmsg+0x7b/0x90 [ 149.981035][ T6601] do_syscall_64+0x34/0x70 [ 149.985289][ T6601] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 149.991098][ T6601] RIP: 0033:0x7f8404050819 [ 149.995607][ T6601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 150.015302][ T6601] RSP: 002b:00007f84026c9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 150.023624][ T6601] RAX: ffffffffffffffda RBX: 00007f8404207fa0 RCX: 00007f8404050819 [ 150.031519][ T6601] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 150.039334][ T6601] RBP: 00007f84026c9090 R08: 0000000000000000 R09: 0000000000000000 [ 150.047234][ T6601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 150.055135][ T6601] R13: 0000000000000000 R14: 00007f8404207fa0 R15: 00007fff2f7dbd98 [ 150.106032][ T6618] syz.1.1854[6618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.106093][ T6618] syz.1.1854[6618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.171746][ T6618] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.190155][ T6618] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.204437][ T6620] device pim6reg1 entered promiscuous mode [ 150.469314][ T6635] device syzkaller0 entered promiscuous mode [ 150.687128][ T6649] device pim6reg1 entered promiscuous mode [ 150.789571][ T6667] bridge0: port 3(vlan1) entered blocking state [ 150.796031][ T6667] bridge0: port 3(vlan1) entered disabled state [ 150.836981][ T6667] device vlan1 entered promiscuous mode [ 150.863049][ T6667] bridge0: port 3(vlan1) entered blocking state [ 150.869260][ T6667] bridge0: port 3(vlan1) entered forwarding state [ 151.187577][ T6706] device pim6reg1 entered promiscuous mode [ 152.273245][ T6778] device syzkaller0 entered promiscuous mode [ 152.482003][ T6794] device veth0_vlan left promiscuous mode [ 152.520964][ T6794] device veth0_vlan entered promiscuous mode [ 152.573628][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.600492][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.629909][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.931740][ T6818] bridge0: port 3(vlan1) entered disabled state [ 153.015489][ T6818] device veth0_vlan left promiscuous mode [ 153.030473][ T6818] device veth0_vlan entered promiscuous mode [ 153.051191][ T6818] bridge0: port 3(vlan1) entered blocking state [ 153.057476][ T6818] bridge0: port 3(vlan1) entered forwarding state [ 153.096328][ T6830] device syzkaller0 entered promiscuous mode [ 164.126885][ T6849] device veth0_vlan left promiscuous mode [ 164.150634][ T6849] device veth0_vlan entered promiscuous mode [ 164.182109][ T6859] device syzkaller0 entered promiscuous mode [ 164.406075][ T6884] syz.3.1937[6884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.406122][ T6884] syz.3.1937[6884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.627249][ T6928] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.646668][ T6928] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.722083][ T6932] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.728958][ T6932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.736071][ T6932] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.742832][ T6932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.766647][ T6932] device bridge0 entered promiscuous mode [ 166.269684][ T6982] bridge0: port 3(vlan1) entered disabled state [ 166.275969][ T6982] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.282973][ T6982] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.324261][ T6989] syz.3.1961[6989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.411025][ T6982] bridge0: port 3(vlan1) entered blocking state [ 166.428335][ T6982] bridge0: port 3(vlan1) entered forwarding state [ 166.434669][ T6982] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.441432][ T6982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.448501][ T6982] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.455429][ T6982] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.585019][ T6982] device bridge0 entered promiscuous mode [ 166.635859][ T6991] device syzkaller0 entered promiscuous mode [ 167.173408][ T7027] device pim6reg1 entered promiscuous mode [ 167.346478][ T7033] device syzkaller0 entered promiscuous mode [ 167.446218][ T7043] device wg2 entered promiscuous mode [ 167.730153][ T7052] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.737507][ T7052] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.765430][ T7052] device bridge0 left promiscuous mode [ 167.982674][ T7077] device pim6reg1 entered promiscuous mode [ 168.091881][ T7108] device pim6reg1 entered promiscuous mode [ 168.248824][ T7117] bridge0: port 3(vlan1) entered disabled state [ 168.285520][ T7117] device veth0_vlan left promiscuous mode [ 168.317842][ T7117] device veth0_vlan entered promiscuous mode [ 168.364566][ T7117] bridge0: port 3(vlan1) entered blocking state [ 168.371081][ T7117] bridge0: port 3(vlan1) entered forwarding state [ 168.448260][ T7135] device pim6reg1 entered promiscuous mode [ 168.623818][ T7158] device veth1_macvtap left promiscuous mode [ 168.721784][ T7167] bridge0: port 3(vlan1) entered disabled state [ 168.876504][ T7176] device veth1_macvtap left promiscuous mode [ 168.929851][ T7176] device veth1_macvtap entered promiscuous mode [ 168.950187][ T7176] device macsec0 entered promiscuous mode [ 168.969097][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 169.003405][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 169.048232][ T24] audit: type=1400 audit(1732384856.090:173): avc: denied { create } for pid=7175 comm="syz.9.2024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 170.605719][ T7303] device macsec0 left promiscuous mode [ 170.907450][ T7307] device veth0_to_bond entered promiscuous mode [ 171.269902][ T7324] syz.1.2070[7324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.269953][ T7324] syz.1.2070[7324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.633283][ T7358] device veth0_vlan left promiscuous mode [ 171.734735][ T7358] device veth0_vlan entered promiscuous mode [ 171.921609][ T7375] device veth0_vlan left promiscuous mode [ 171.947495][ T7375] device veth0_vlan entered promiscuous mode [ 171.986117][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.002108][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.020840][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.095896][ T7385] device pim6reg1 entered promiscuous mode [ 172.768313][ T7458] device pim6reg1 entered promiscuous mode [ 173.020192][ T7491] device pim6reg1 entered promiscuous mode [ 173.112331][ T7500] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 173.134807][ T7500] device syzkaller0 entered promiscuous mode [ 173.742001][ T7562] device sit0 left promiscuous mode [ 173.771222][ T7562] device sit0 entered promiscuous mode [ 174.489364][ T7647] device sit0 left promiscuous mode [ 174.808039][ T7647] device sit0 entered promiscuous mode [ 175.567630][ T7680] device wg2 entered promiscuous mode [ 175.901269][ T7693] device pim6reg1 entered promiscuous mode [ 176.451404][ T7739] device pim6reg1 entered promiscuous mode [ 176.497286][ T7748] device veth0_vlan left promiscuous mode [ 176.514668][ T7748] device veth0_vlan entered promiscuous mode [ 176.555529][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.580301][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.612400][ T111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.710857][ T7770] device sit0 left promiscuous mode [ 176.728070][ T7770] device sit0 entered promiscuous mode [ 177.647262][ T7832] ÿÿÿÿÿÿÿÿ: renamed from vlan1 [ 178.383008][ T7871] syz.3.2229[7871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.383066][ T7871] syz.3.2229[7871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.787227][ T7887] device veth0_vlan left promiscuous mode [ 178.834629][ T7887] device veth0_vlan entered promiscuous mode [ 178.920751][ T7906] device pim6reg1 entered promiscuous mode [ 179.469301][ T7912] device syzkaller0 entered promiscuous mode [ 179.797752][ T7936] device veth0_vlan left promiscuous mode [ 179.855363][ T7936] device veth0_vlan entered promiscuous mode [ 179.941183][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.954464][ T7948] syz.3.2254[7948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.955819][ T7948] syz.3.2254[7948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.959430][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.083060][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.100830][ T304] bridge0: port 3(vlan1) entered blocking state [ 180.106914][ T304] bridge0: port 3(vlan1) entered forwarding state [ 180.475102][ T7965] syz.1.2259[7965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.475186][ T7965] syz.1.2259[7965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.915678][ T7982] device syzkaller0 entered promiscuous mode [ 181.000976][ T7985] bridge0: port 3(vlan1) entered disabled state [ 181.103131][ T7985] ªªªªªª: renamed from vlan0 [ 182.076688][ T8021] device veth0_vlan left promiscuous mode [ 182.094851][ T8021] device veth0_vlan entered promiscuous mode [ 183.064088][ T8066] device veth0_vlan left promiscuous mode [ 183.115947][ T8066] device veth0_vlan entered promiscuous mode [ 183.589940][ T8105] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 183.595553][ T8105] pim6reg0: linktype set to 776 [ 183.840918][ T8134] device veth1_macvtap left promiscuous mode [ 184.007977][ T8134] device veth1_macvtap entered promiscuous mode [ 184.041748][ T8134] device macsec0 entered promiscuous mode [ 184.636560][ T8187] device syzkaller0 entered promiscuous mode [ 184.702606][ T8195] device pim6reg1 entered promiscuous mode [ 185.028796][ T8217] device syzkaller0 entered promiscuous mode [ 185.822127][ T8253] syz.9.2341[8253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.823013][ T8253] syz.9.2341[8253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.957008][ T8253] device pim6reg1 entered promiscuous mode [ 187.397693][ T8317] device bridge_slave_1 left promiscuous mode [ 187.406813][ T8317] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.442475][ T8317] device bridge_slave_0 left promiscuous mode [ 187.463145][ T8317] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.543564][ T8320] Â: renamed from pim6reg1 [ 187.795833][ T8335] device syzkaller0 entered promiscuous mode [ 187.819307][ T8341] cgroup: fork rejected by pids controller in /syz9 [ 188.134602][ T8359] pim6reg0: tun_chr_ioctl cmd 1074025680 [ 188.145331][ T24] audit: type=1400 audit(1732384875.190:174): avc: denied { create } for pid=8353 comm="syz.1.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 188.380008][ T8366] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 188.385493][ T8366] pim6reg0: linktype set to 0 [ 188.416018][ T8366] device pim6reg1 entered promiscuous mode [ 188.538203][ T8367] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.558509][ T8367] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.566106][ T8367] device bridge_slave_0 entered promiscuous mode [ 188.573346][ T8367] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.580404][ T8367] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.587816][ T8367] device bridge_slave_1 entered promiscuous mode [ 188.771902][ T8367] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.779249][ T8367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.786316][ T8367] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.793139][ T8367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.935935][ T383] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.950948][ T383] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.986819][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.997589][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.052697][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.064500][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.085148][ T383] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.092121][ T383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.146180][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.166186][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.210128][ T383] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.217173][ T383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.231375][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.240025][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.293031][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.306701][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.315011][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 189.324147][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 189.350765][ T8438] device syzkaller0 entered promiscuous mode [ 189.368525][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 189.396050][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.412012][ T8367] device veth0_vlan entered promiscuous mode [ 189.435570][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.443404][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.460727][ T8367] device veth1_macvtap entered promiscuous mode [ 189.467733][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 189.478094][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.486368][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 189.506299][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 189.514901][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.523724][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.539250][ T383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 189.646904][ T8454] device syzkaller0 entered promiscuous mode [ 289.809533][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 289.816343][ C1] rcu: 0-...!: (1 GPs behind) idle=2a6/1/0x4000000000000000 softirq=28312/28314 fqs=34 last_accelerate: d4ad/fbc3 dyntick_enabled: 1 [ 289.829959][ C1] (detected by 1, t=10006 jiffies, g=32189, q=242) [ 289.836382][ C1] Sending NMI from CPU 1 to CPUs 0: [ 289.842538][ C1] NMI backtrace for cpu 0 [ 289.842544][ C1] CPU: 0 PID: 8465 Comm: syz.2.2415 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 289.842549][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 289.842552][ C1] RIP: 0010:kvm_wait+0xec/0x150 [ 289.842561][ C1] Code: 03 42 0f b6 04 20 84 c0 75 6a 41 0f b6 45 00 44 38 f0 75 26 41 f7 c7 00 02 00 00 75 0f 0f 1f 44 00 00 0f 00 2d 55 53 d5 03 f4 0e 0f 1f 44 00 00 0f 00 2d 46 53 d5 03 fb f4 4c 89 7c 24 18 ff [ 289.842565][ C1] RSP: 0018:ffffc90000de7000 EFLAGS: 00000046 [ 289.842573][ C1] RAX: 0000000000000003 RBX: 1ffff920001bce04 RCX: ffffffff8150b854 [ 289.842577][ C1] RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffc90000de7040 [ 289.842581][ C1] RBP: ffffc90000de70b0 R08: dffffc0000000000 R09: ffffed1021663ad6 [ 289.842585][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 289.842588][ C1] R13: ffff88810b31d6a8 R14: 0000000000000003 R15: 0000000000000046 [ 289.842592][ C1] FS: 00007f20cf5cc6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 289.842596][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 289.842601][ C1] CR2: 0000000020008000 CR3: 000000011ec39000 CR4: 00000000003506b0 [ 289.842605][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 289.842609][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 289.842611][ C1] Call Trace: [ 289.842613][ C1] [ 289.842616][ C1] ? show_regs+0x58/0x60 [ 289.842618][ C1] ? nmi_cpu_backtrace+0x133/0x160 [ 289.842621][ C1] ? kvm_wait+0xec/0x150 [ 289.842624][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 289.842627][ C1] ? nmi_handle+0xa8/0x280 [ 289.842629][ C1] ? kvm_wait+0xec/0x150 [ 289.842632][ C1] ? default_do_nmi+0x69/0x160 [ 289.842634][ C1] ? exc_nmi+0xad/0x100 [ 289.842637][ C1] ? end_repeat_nmi+0x16/0x31 [ 289.842641][ C1] ? __pv_queued_spin_lock_slowpath+0x6d4/0xc70 [ 289.842643][ C1] ? kvm_wait+0xec/0x150 [ 289.842646][ C1] ? kvm_wait+0xec/0x150 [ 289.842648][ C1] ? kvm_wait+0xec/0x150 [ 289.842650][ C1] [ 289.842653][ C1] ? stack_depot_save+0xe/0x10 [ 289.842655][ C1] ? save_stack+0x1c3/0x240 [ 289.842658][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 289.842661][ C1] ? __alloc_pages_nodemask+0x435/0xaf0 [ 289.842664][ C1] __pv_queued_spin_lock_slowpath+0x72f/0xc70 [ 289.842667][ C1] ? __pv_queued_spin_unlock_slowpath+0x280/0x280 [ 289.842670][ C1] ? __kasan_check_write+0x14/0x20 [ 289.842673][ C1] ? prep_compound_page+0x24e/0x330 [ 289.842676][ C1] _raw_spin_lock_irqsave+0x1a0/0x210 [ 289.842678][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 289.842681][ C1] ? get_page_from_freelist+0x2d8c/0x2f30 [ 289.842684][ C1] ? htab_map_hash+0x371/0x7e0 [ 289.842687][ C1] htab_map_delete_elem+0xe2/0x4f0 [ 289.842690][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x834 [ 289.842693][ C1] bpf_trace_run4+0x13e/0x2e0 [ 289.842695][ C1] ? bpf_trace_run3+0x2c0/0x2c0 [ 289.842698][ C1] ? __alloc_pages_nodemask+0xaf0/0xaf0 [ 289.842701][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 289.842704][ C1] __alloc_pages_nodemask+0xa8e/0xaf0 [ 289.842707][ C1] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 289.842710][ C1] ? can_reuse_spf_vma+0xe0/0xe0 [ 289.842712][ C1] kmalloc_order+0x4c/0x170 [ 289.842715][ C1] kmalloc_order_trace+0x18/0x90 [ 289.842717][ C1] __kmalloc+0x1f1/0x330 [ 289.842720][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 289.842723][ C1] alloc_htab_elem+0x269/0x710 [ 289.842726][ C1] ? htab_map_hash+0x371/0x7e0 [ 289.842728][ C1] htab_map_update_elem+0x2c6/0x880 [ 289.842731][ C1] bpf_map_update_value+0x230/0x420 [ 289.842734][ C1] __se_sys_bpf+0x7687/0x11cb0 [ 289.842737][ C1] ? futex_wait+0x6a0/0x7c0 [ 289.842739][ C1] ? __x64_sys_bpf+0x90/0x90 [ 289.842742][ C1] ? do_futex+0x17b0/0x17b0 [ 289.842745][ C1] ? do_futex+0x139a/0x17b0 [ 289.842747][ C1] ? __kasan_check_write+0x14/0x20 [ 289.842750][ C1] ? put_vma+0x8f/0xb0 [ 289.842753][ C1] ? __handle_speculative_fault+0x10c1/0x1e90 [ 289.842756][ C1] ? futex_exit_release+0x1e0/0x1e0 [ 289.842759][ C1] ? __kasan_check_write+0x14/0x20 [ 289.842761][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 289.842764][ C1] ? __se_sys_futex+0x355/0x470 [ 289.842767][ C1] ? __fget_files+0x31e/0x380 [ 289.842770][ C1] ? fpu__clear_all+0x20/0x20 [ 289.842772][ C1] ? __kasan_check_read+0x11/0x20 [ 289.842775][ C1] __x64_sys_bpf+0x7b/0x90 [ 289.842777][ C1] do_syscall_64+0x34/0x70 [ 289.842780][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 289.842783][ C1] RIP: 0033:0x7f20d0f53819 [ 289.842791][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 289.842794][ C1] RSP: 002b:00007f20cf5cc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 289.842801][ C1] RAX: ffffffffffffffda RBX: 00007f20d110afa0 RCX: 00007f20d0f53819 [ 289.842805][ C1] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000002 [ 289.842809][ C1] RBP: 00007f20d0fc675e R08: 0000000000000000 R09: 0000000000000000 [ 289.842812][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 289.842816][ C1] R13: 0000000000000000 R14: 00007f20d110afa0 R15: 00007ffdd83d6e98 [ 289.842830][ C1] rcu: rcu_preempt kthread starved for 9925 jiffies! g32189 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 290.357193][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 290.366995][ C1] rcu: RCU grace-period kthread stack dump: [ 290.372729][ C1] task:rcu_preempt state:R running task stack: 0 pid: 13 ppid: 2 flags:0x00004000 [ 290.383417][ C1] Call Trace: [ 290.386544][ C1] __schedule+0xbe6/0x1330 [ 290.390884][ C1] ? release_firmware_map_entry+0x18d/0x18d [ 290.396627][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 290.401907][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 290.406592][ C1] schedule+0x13d/0x1d0 [ 290.410598][ C1] schedule_timeout+0x18c/0x360 [ 290.415371][ C1] ? prepare_to_swait_event+0x39f/0x3e0 [ 290.420832][ C1] ? console_conditional_schedule+0x10/0x10 [ 290.426571][ C1] ? run_local_timers+0x160/0x160 [ 290.431421][ C1] rcu_gp_kthread+0xefc/0x23a0 [ 290.436106][ C1] ? dyntick_save_progress_counter+0x1c0/0x1c0 [ 290.442095][ C1] ? rcu_barrier_callback+0x50/0x50 [ 290.447215][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 290.451904][ C1] ? __kasan_check_read+0x11/0x20 [ 290.456851][ C1] ? __kthread_parkme+0xb9/0x1c0 [ 290.461623][ C1] kthread+0x34b/0x3d0 [ 290.465530][ C1] ? rcu_barrier_callback+0x50/0x50 [ 290.470563][ C1] ? kthread_blkcg+0xd0/0xd0 [ 290.474997][ C1] ret_from_fork+0x1f/0x30 [ 440.816998][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz.2.2415:8464] [ 440.825049][ C1] Modules linked in: [ 440.828888][ C1] CPU: 1 PID: 8464 Comm: syz.2.2415 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 440.840011][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 440.849894][ C1] RIP: 0010:smp_call_function_single+0x27d/0x510 [ 440.856134][ C1] Code: 00 44 8b 6c 24 48 44 89 ee 83 e6 01 31 ff e8 fa ed 0a 00 41 83 e5 01 75 0a e8 3f ea 0a 00 e9 eb 00 00 00 f3 90 42 0f b6 04 23 <84> c0 75 15 f7 44 24 48 01 00 00 00 0f 84 cd 00 00 00 e8 1c ea 0a [ 440.876456][ C1] RSP: 0018:ffffc90000f17800 EFLAGS: 00000293 [ 440.882545][ C1] RAX: 0000000000000000 RBX: 1ffff920001e2f09 RCX: ffff88813611cf00 [ 440.890783][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 440.898755][ C1] RBP: ffffc90000f178f0 R08: ffffffff815fc2a6 R09: ffffed103ee0aec9 [ 440.906659][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 440.914570][ C1] R13: 0000000000000001 R14: ffffc90000f17848 R15: 0000000000000000 [ 440.922364][ C1] FS: 0000555582003500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 440.931279][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 440.937748][ C1] CR2: 000000110c2d2993 CR3: 000000011ec39000 CR4: 00000000003506a0 [ 440.945652][ C1] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 440.953521][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 440.961425][ C1] Call Trace: [ 440.964658][ C1] [ 440.967333][ C1] ? show_regs+0x58/0x60 [ 440.971411][ C1] ? watchdog_timer_fn+0x471/0x590 [ 440.976547][ C1] ? proc_watchdog_cpumask+0xd0/0xd0 [ 440.981749][ C1] ? __hrtimer_run_queues+0x3d7/0xa50 [ 440.986962][ C1] ? hrtimer_interrupt+0x8b0/0x8b0 [ 440.991904][ C1] ? ktime_get_update_offsets_now+0x266/0x280 [ 440.998274][ C1] ? hrtimer_interrupt+0x39a/0x8b0 [ 441.003217][ C1] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 441.009114][ C1] ? asm_call_irq_on_stack+0xf/0x20 [ 441.014143][ C1] [ 441.016931][ C1] ? sysvec_apic_timer_interrupt+0x85/0xe0 [ 441.022757][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 441.028828][ C1] ? smp_call_function_single+0x266/0x510 [ 441.034564][ C1] ? smp_call_function_single+0x27d/0x510 [ 441.040111][ C1] ? text_poke_sync+0x20/0x20 [ 441.044624][ C1] ? flush_smp_call_function_from_idle+0x1b0/0x1b0 [ 441.050948][ C1] ? cpumask_any_but+0x18/0xb0 [ 441.055546][ C1] ? text_poke_sync+0x20/0x20 [ 441.060146][ C1] ? cpumask_any_but+0xa3/0xb0 [ 441.064745][ C1] smp_call_function_many_cond+0x94e/0xa30 [ 441.070404][ C1] ? __alloc_pages_nodemask+0x490/0xaf0 [ 441.075855][ C1] ? text_poke_sync+0x20/0x20 [ 441.080369][ C1] ? smp_call_function_many+0x40/0x40 [ 441.085582][ C1] ? text_poke+0x20/0x20 [ 441.089659][ C1] ? insn_decode+0x308/0x490 [ 441.094183][ C1] ? text_poke_sync+0x20/0x20 [ 441.098779][ C1] on_each_cpu+0xa8/0x1a0 [ 441.102956][ C1] ? text_poke_loc_init+0x2e1/0x580 [ 441.108145][ C1] ? smp_call_function+0x90/0x90 [ 441.112919][ C1] ? text_poke_finish+0x30/0x30 [ 441.117635][ C1] text_poke_bp_batch+0x1d4/0x600 [ 441.122762][ C1] ? __kasan_check_write+0x14/0x20 [ 441.127715][ C1] ? text_poke_loc_init+0x580/0x580 [ 441.132835][ C1] ? mutex_lock+0xa5/0x110 [ 441.137077][ C1] ? mutex_trylock+0xa0/0xa0 [ 441.141611][ C1] ? __kasan_check_write+0x14/0x20 [ 441.146570][ C1] text_poke_finish+0x1a/0x30 [ 441.151095][ C1] arch_jump_label_transform_apply+0x15/0x30 [ 441.157026][ C1] __jump_label_update+0x36a/0x380 [ 441.161948][ C1] jump_label_update+0x379/0x400 [ 441.166817][ C1] static_key_disable_cpuslocked+0xcd/0x1b0 [ 441.172545][ C1] static_key_disable+0x1a/0x30 [ 441.177237][ C1] tracepoint_probe_unregister+0x6e0/0x9e0 [ 441.183033][ C1] ? __bpf_trace_mm_page_free_batched+0x60/0x60 [ 441.189296][ C1] bpf_probe_unregister+0x61/0x70 [ 441.194230][ C1] bpf_raw_tp_link_release+0x63/0x90 [ 441.199486][ C1] bpf_link_put+0x1fd/0x280 [ 441.203892][ C1] ? __bpf_prog_put_rcu+0x170/0x170 [ 441.208928][ C1] bpf_link_release+0x3b/0x40 [ 441.213447][ C1] __fput+0x33d/0x7b0 [ 441.217280][ C1] ____fput+0x15/0x20 [ 441.221089][ C1] task_work_run+0x129/0x190 [ 441.225504][ C1] exit_to_user_mode_loop+0xbf/0xd0 [ 441.230664][ C1] syscall_exit_to_user_mode+0xa2/0x1a0 [ 441.236060][ C1] do_syscall_64+0x40/0x70 [ 441.240296][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 441.246021][ C1] RIP: 0033:0x7f20d0f53819 [ 441.250446][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.270237][ C1] RSP: 002b:00007ffdd83d6ff8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 441.278472][ C1] RAX: 0000000000000000 RBX: 00007f20d110cba0 RCX: 00007f20d0f53819 [ 441.286469][ C1] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 441.294278][ C1] RBP: 00007f20d110cba0 R08: 0000000000000060 R09: 00007ffdd83d72ef [ 441.302106][ C1] R10: 00007f20d110cac0 R11: 0000000000000246 R12: 000000000002e85f [ 441.309918][ C1] R13: 00007ffdd83d7100 R14: 0000000000000032 R15: ffffffffffffffff [ 441.317726][ C1] Sending NMI from CPU 1 to CPUs 0: [ 441.323760][ C1] NMI backtrace for cpu 0 [ 441.323766][ C1] CPU: 0 PID: 8465 Comm: syz.2.2415 Tainted: G W 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 441.323771][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 441.323774][ C1] RIP: 0010:kvm_wait+0xec/0x150 [ 441.323783][ C1] Code: 03 42 0f b6 04 20 84 c0 75 6a 41 0f b6 45 00 44 38 f0 75 26 41 f7 c7 00 02 00 00 75 0f 0f 1f 44 00 00 0f 00 2d 55 53 d5 03 f4 0e 0f 1f 44 00 00 0f 00 2d 46 53 d5 03 fb f4 4c 89 7c 24 18 ff [ 441.323786][ C1] RSP: 0018:ffffc90000de7000 EFLAGS: 00000046 [ 441.323795][ C1] RAX: 0000000000000003 RBX: 1ffff920001bce04 RCX: ffffffff8150b854 [ 441.323799][ C1] RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffc90000de7040 [ 441.323803][ C1] RBP: ffffc90000de70b0 R08: dffffc0000000000 R09: ffffed1021663ad6 [ 441.323807][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 441.323811][ C1] R13: ffff88810b31d6a8 R14: 0000000000000003 R15: 0000000000000046 [ 441.323815][ C1] FS: 00007f20cf5cc6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 441.323818][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 441.323822][ C1] CR2: 0000000020008000 CR3: 000000011ec39000 CR4: 00000000003506b0 [ 441.323826][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 441.323829][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 441.323831][ C1] Call Trace: [ 441.323834][ C1] [ 441.323836][ C1] ? show_regs+0x58/0x60 [ 441.323839][ C1] ? nmi_cpu_backtrace+0x133/0x160 [ 441.323841][ C1] ? kvm_wait+0xec/0x150 [ 441.323844][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 441.323847][ C1] ? nmi_handle+0xa8/0x280 [ 441.323849][ C1] ? kvm_wait+0xec/0x150 [ 441.323852][ C1] ? kvm_wait+0xec/0x150 [ 441.323854][ C1] ? default_do_nmi+0x69/0x160 [ 441.323857][ C1] ? exc_nmi+0xad/0x100 [ 441.323859][ C1] ? end_repeat_nmi+0x16/0x31 [ 441.323863][ C1] ? __pv_queued_spin_lock_slowpath+0x6d4/0xc70 [ 441.323865][ C1] ? kvm_wait+0xec/0x150 [ 441.323867][ C1] ? kvm_wait+0xec/0x150 [ 441.323870][ C1] ? kvm_wait+0xec/0x150 [ 441.323872][ C1] [ 441.323874][ C1] ? stack_depot_save+0xe/0x10 [ 441.323877][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 441.323880][ C1] ? __alloc_pages_nodemask+0x435/0xaf0 [ 441.323883][ C1] __pv_queued_spin_lock_slowpath+0x72f/0xc70 [ 441.323886][ C1] ? __pv_queued_spin_unlock_slowpath+0x280/0x280 [ 441.323889][ C1] ? __kasan_check_write+0x14/0x20 [ 441.323892][ C1] ? prep_compound_page+0x24e/0x330 [ 441.323894][ C1] _raw_spin_lock_irqsave+0x1a0/0x210 [ 441.323897][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 441.323900][ C1] ? get_page_from_freelist+0x2d8c/0x2f30 [ 441.323903][ C1] ? htab_map_hash+0x371/0x7e0 [ 441.323905][ C1] htab_map_delete_elem+0xe2/0x4f0 [ 441.323908][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x834 [ 441.323911][ C1] bpf_trace_run4+0x13e/0x2e0 [ 441.323913][ C1] ? bpf_trace_run3+0x2c0/0x2c0 [ 441.323916][ C1] ? __alloc_pages_nodemask+0xaf0/0xaf0 [ 441.323919][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 441.323922][ C1] __alloc_pages_nodemask+0xa8e/0xaf0 [ 441.323925][ C1] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 441.323928][ C1] ? can_reuse_spf_vma+0xe0/0xe0 [ 441.323930][ C1] kmalloc_order+0x4c/0x170 [ 441.323933][ C1] kmalloc_order_trace+0x18/0x90 [ 441.323935][ C1] __kmalloc+0x1f1/0x330 [ 441.323938][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 441.323941][ C1] alloc_htab_elem+0x269/0x710 [ 441.323944][ C1] ? htab_map_hash+0x371/0x7e0 [ 441.323947][ C1] htab_map_update_elem+0x2c6/0x880 [ 441.323950][ C1] bpf_map_update_value+0x230/0x420 [ 441.323952][ C1] __se_sys_bpf+0x7687/0x11cb0 [ 441.323955][ C1] ? futex_wait+0x6a0/0x7c0 [ 441.323957][ C1] ? __x64_sys_bpf+0x90/0x90 [ 441.323960][ C1] ? do_futex+0x17b0/0x17b0 [ 441.323962][ C1] ? do_futex+0x139a/0x17b0 [ 441.323965][ C1] ? __kasan_check_write+0x14/0x20 [ 441.323967][ C1] ? put_vma+0x8f/0xb0 [ 441.323970][ C1] ? __handle_speculative_fault+0x10c1/0x1e90 [ 441.323973][ C1] ? futex_exit_release+0x1e0/0x1e0 [ 441.323976][ C1] ? __kasan_check_write+0x14/0x20 [ 441.323979][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 441.323982][ C1] ? __se_sys_futex+0x355/0x470 [ 441.323984][ C1] ? __fget_files+0x31e/0x380 [ 441.323987][ C1] ? fpu__clear_all+0x20/0x20 [ 441.323989][ C1] ? __kasan_check_read+0x11/0x20 [ 441.323992][ C1] __x64_sys_bpf+0x7b/0x90 [ 441.323994][ C1] do_syscall_64+0x34/0x70 [ 441.323997][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 441.324000][ C1] RIP: 0033:0x7f20d0f53819 [ 441.324007][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.324010][ C1] RSP: 002b:00007f20cf5cc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 441.324017][ C1] RAX: ffffffffffffffda RBX: 00007f20d110afa0 RCX: 00007f20d0f53819 [ 441.324021][ C1] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000002 [ 441.324025][ C1] RBP: 00007f20d0fc675e R08: 0000000000000000 R09: 0000000000000000 [ 441.324028][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 441.324032][ C1] R13: 0000000000000000 R14: 00007f20d110afa0 R15: 00007ffdd83d6e98