last executing test programs: 12m18.959067714s ago: executing program 32 (id=354): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRESDEC=r0], 0x48) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)={'b', ' *:* ', 'm\x00'}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0xc, &(0x7f00000000c0)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffeff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x14, &(0x7f00000000c0), 0x43) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0x1c, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xbff7b694, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x2}, @tail_call, @alu={0x4, 0x0, 0xd, 0x3, 0x2, 0xffffffffffffffe0}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='GPL\x00', 0x2, 0x42, &(0x7f0000000280)=""/66, 0x40f00, 0x49, '\x00', 0x0, @fallback=0x27, r2, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f00000006c0)=[{0x1, 0x1, 0x5}, {0x3, 0x1, 0x1, 0x5}, {0x3, 0x3, 0xf, 0x3}], 0x10, 0x10000}, 0x94) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000240)=0x6fa6, 0x12) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x1, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 12m18.948098405s ago: executing program 33 (id=350): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1, 0x0, 0x4}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff92) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x50, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x810, 0x0, 0x5, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000001811", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0xe, 0x3, 0x0, 0xff, 0x0, 0x5, 0xc8680, 0x6, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x43, 0x4, @perf_config_ext={0x0, 0x1}, 0x10804, 0x981e, 0x3, 0x7, 0x56b, 0x1, 0x3, 0x0, 0xbf38, 0x0, 0x5}, 0x0, 0x10, r2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000540), 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) 12m18.929809055s ago: executing program 34 (id=355): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffe, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r2, 0x58, &(0x7f0000000700)}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffd02}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000400000004"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="01000000010000000500080001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r11, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000003c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r12}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r13}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)) sendmsg$unix(r8, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000007c0)='T', 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) recvmsg$unix(r7, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)=""/230, 0xe6}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008, r0}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x58, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x7a, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x804) 12m18.915692745s ago: executing program 35 (id=353): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x30024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100083, 0xa3f, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="16000000000000000400e8ff2000000016000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=r3, @ANYRESOCT=0x0, @ANYBLOB='\x00'/28, @ANYRES32=r0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="02000000040000000800000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r9}, 0x3d) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r10}, 0x3d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r7, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r11}, 0x10) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 12m18.901608535s ago: executing program 36 (id=357): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[], 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8602, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x1000}) socketpair(0xb, 0x5, 0x5, &(0x7f00000003c0)) ioctl$TUNGETVNETBE(r6, 0x800454df, &(0x7f0000000040)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r10 = getpid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='alloc_extent_state\x00', r7, 0x0, 0x800}, 0x18) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xd, 0x4, 0x52, 0xe, 0x0, 0xfff, 0x2028, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xad5a, 0x1, @perf_config_ext={0x7, 0x100000000}, 0x102100, 0x8, 0x9, 0x9, 0xffffffff, 0x4, 0x9, 0x0, 0x0, 0x0, 0xa}, r10, 0x0, r9, 0x0) r11 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x80, 0x3, 0x2, 0xb, 0x7, 0x0, 0x0, 0x400, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x8, 0x9}, 0x601, 0x53, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1ff, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0xc) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x2, 0x8, 0x5, 0xff, 0x0, 0x9, 0x4400, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x9, 0x10, 0x2, 0x6, 0x7, 0xfffffff8, 0xb0b, 0x0, 0x808, 0x0, 0x40}, r10, 0xa, r11, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) write$cgroup_subtree(r6, &(0x7f0000000240)=ANY=[], 0x66) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r10, r2, 0x0, 0x6, &(0x7f0000000400)='-%$&/\x00'}, 0x30) 6m13.354588963s ago: executing program 37 (id=4269): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x8000000000000000}, 0x4130, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfff4}, 0x0, 0x0, r0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000200000408000000000000000300000000000000000000000200000000000000000000000000000200000000000000000000000404"], 0x0, 0x56}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="000000000100008000"/27], 0x48) r2 = perf_event_open(&(0x7f0000001540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0xff}, 0x0, 0x1, 0xffffffffffffffff, 0x9) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='kmem_cache_free\x00', r4, 0x0, 0xfffffffffffffff7}, 0x18) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0}, 0x94) r5 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000014c0)={r5, r2, 0x0, 0x18, &(0x7f0000001480)='workqueue_activate_work\x00'}, 0x30) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffff22}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0xa) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00', r6}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r8}, 0x10) mkdir(&(0x7f0000000540)='./file0\x00', 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f0000000000)=@framed={{0x4e, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x6f}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x40000026, &(0x7f0000000540), 0x0, 0x10, &(0x7f0000000580), &(0x7f0000000500), 0x8, 0xb3, 0x8, 0x8, &(0x7f0000001500)}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce81e0036c00fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) syz_clone(0x24100400, &(0x7f0000000a40)="b8913430a3e1cafa000000003b9d30b175a45f22a1fd26a5a315be7e7e8bc50610e54058cd643175edd9ee84b1eb1d75d8d75576cf5bb92be3e66d8e99187b0edf8f8a8f59556d6469a529ad5231dd68c4b39621323138", 0x57, 0x0, &(0x7f00000004c0), 0x0) syz_clone(0x200400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) 6m13.314363284s ago: executing program 38 (id=4266): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x28000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110e22fff6) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="b40000000000000061115c000000000016000000000000009500740000000000df51c8015d2bdb7786a7e2720a311cc637514a6bda3621dd6e34ebc40949d9566fcb521f6316379d7f9e786141e775dc818b8076904340a7d58ba01fda"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x48) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000000)=ANY=[@ANYRES64=r4, @ANYRES32=0x0, @ANYRES16=r4], 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@base={0x11, 0x4, 0x4, 0x1000ff, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r6, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000040)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r9}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@map=r5, 0x33, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)=ANY=[@ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="8eb7a5730f94efec", @ANYRES32=r3, @ANYBLOB, @ANYRES64=r10], 0x20) 6m13.271671314s ago: executing program 39 (id=4268): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x18, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000002e40)={0x1a, 0x17, &(0x7f0000000800)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, @ringbuf_query, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @map_idx={0x18, 0x5}, @jmp={0x5, 0x0, 0x6, 0x8, 0x0, 0x10, 0x4}, @jmp={0x5, 0x1, 0x5, 0x8, 0x4, 0x2, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}}], &(0x7f00000008c0)='GPL\x00', 0x7ad, 0x1000, &(0x7f0000001d80)=""/4096, 0x41000, 0x10, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000002d80)={0x9, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1, 0x4, &(0x7f0000002dc0)=[r4, r3, r2, 0xffffffffffffffff, r0], &(0x7f0000002e00)=[{0x5, 0x5, 0xf, 0xb}, {0x0, 0x3, 0x2, 0xc}, {0x5, 0x2, 0x3, 0xa}, {0x4, 0x4, 0x9, 0x6}], 0x10, 0x3}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000018", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r9, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x3, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000900)='kmem_cache_free\x00', r11}, 0x18) sendmsg$tipc(r10, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r8, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0xee, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x29, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r12, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r13}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 6m13.219171165s ago: executing program 40 (id=4270): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='rss_stat\x00', r3, 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r6}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x0, 0x49, 0x63, &(0x7f0000000380)="5a1525ebff0eb52064443f1b8d5e0aa95d4146cae9ec22ca5f7acfeddb765e53b76a45562e0162bc0fbd3e39952df92388ec255bddbcf44585892542a4e29dc65c36a3f06df4448854", &(0x7f00000004c0)=""/99, 0x15c, 0x0, 0x1d, 0x1000, &(0x7f0000000400)="6aa2ea0e6165ff094beefc965a5ae38a14edb4b50282c3d5cb52bb48b9", &(0x7f00000012c0)="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", 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 6m13.181465827s ago: executing program 41 (id=4271): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x4, 0x80, 0x0, 0x0, 0x10, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="09000000070000000000010003"], 0x50) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00'}, 0x94) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000000)={r2, r3, 0x4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018002000000000006300000063000000040000bba9d36d000000001205000019000000000000000300000000010000000400000000000000050000000400000f03000000040000009ca600006614000003000000010000000300000001000000a4000000000000000100000003000000070000007a39f100002e0000b373994ba7e491d1952a4da3c643eb0762bd8c691f8a648ea223abf2b186b78a5ef50e2c"], &(0x7f0000000340)=""/18, 0x80, 0x12, 0x0, 0xb36, 0x10000, @value=r2}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r9 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r8}, 0x8) close(r9) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x1000000, &(0x7f0000000000)="e0ee6933c7df11f0d98e6131c5cb8cae511b9a838f7c32d9f18517bd243074307779b9e94de090a6e321a74ed69b98eb364f34ccd05a4caa44d95dac6044aef053a3a7f60325d91b440652a4445ab1c38226da", 0x53, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000180)="110f4aaf8e82cab26e056c08503407e1882a4d17205bf0032b8f4782b2c8f0c0739bac415a57f2ef6fa8abe04b847a6618571b9fe729ef861bc67660bc66fbe9507812b780303e14b3ba1c748c6ce3546c536420e7aa3b76876f56e9b8e91cace0e90affa69199543be793a8b98eede94a63417b896c4c39386fd1e179f728b585cfa8f6ee064ae721f389036e596753a0f830b93fbac161162bb8133ff0ee0bb20306fdc9744e0fd6affd850852464013fea1c5e5f4258b7641c133ada1e324155d41092f30e262fe391de0d16e6bca7d748aa320d1b549e25bcdb0c0ee5ddead671f9b4f1516288c884a15ed2fbb4452e7") perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="b4000000eb130000691000000000040000000000000095000000000000000000cd32c1f8774c2fb7b5e7c2841eda7250aa4f0d95423504e61f219d2807dfcedaefda88e7f52f7dd70b6c38c788ef3b495872016b531480260c76a8ee146aa3482f79a5106bf13f21e9fa25e46462087083ac7b4a773af4a3470e4c28bfaf"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) syz_clone(0xc510c080, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0) socketpair(0xa, 0x3, 0x0, &(0x7f0000000040)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) 4m15.052533977s ago: executing program 2 (id=5773): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0xa000, 0xc8, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x101, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0xf) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6307e08102030000fe0ea66718330200975a65789ff57b00000000000000cade22000000000000ac9ccb"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8, 0x60}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="19000000040000000400000004000000000000007590a91d38ad4ddf800b842852929e8e27d63b7a04b55ad8504c27e36c2b9607cd41c65c15f128b4ae9e6e", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008230000b7040000000000008500000001000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000060ff850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4m14.973041168s ago: executing program 2 (id=5775): bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e00000004000000040000"], 0x48) r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x0, 0x0}, 0x40000100) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='mm_compaction_end\x00'}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x5, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400000003ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x5000, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2340, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xe, &(0x7f0000000840)=ANY=[@ANYRESHEX=r2, @ANYBLOB="128dc24007176c7acfc02e2a4c5771162073a677d02518b99c5e49012387c1", @ANYBLOB="e8ffffff0000002c733036e1c763e5bd00b70500003ea9fa852000000200"/41, @ANYRES16=r0], &(0x7f0000000200)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x13, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000280)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0x8, 0x9, 0x7}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000400)=[r3, r3, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000004c0)=[{0x5, 0x4, 0xa, 0xb}, {0x5, 0x3, 0xc, 0x5}, {0x1, 0x5, 0xc, 0x6}, {0x1, 0x5, 0x9, 0x7}, {0x1, 0x2, 0x0, 0xa}, {0x5, 0x2, 0x3, 0x1}, {0x2, 0x1, 0x10, 0x1}, {0x5, 0x1}, {0x0, 0x3, 0xa}, {0x2, 0x4, 0x1, 0x9}], 0x10, 0x80000001}, 0x94) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110c23003f) write$cgroup_devices(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="80fd", @ANYRES64=r3], 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='ext4_fc_track_range\x00', 0xffffffffffffffff, 0x0, 0x7}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) close(r6) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000002000000fcffdee4680f8b52a2e0110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r7, @ANYBLOB="0000000100000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffd2c40300000863"], 0x0, 0x80000000}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(r9, 0x0, 0x66) 4m14.85819486s ago: executing program 3 (id=5783): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="d702b0197b366e8c57ea08090d63f439f09e5ddbb83b674ca2f8d8f9b3162e3176a85957e66fc54a8dec246780fe1b1a6116061affba5627c3466ab008734dda48cef033c887e35d9fdfd36ed133f06efef88e5dd27e3f46a2c00a9c97adbe09eeebb7a6c3cef3645f8063e500e0c9fcde46fc8f4bcc3ef505d0229d75e565b21989f0f9c2bd170891c464ab0e214e268ad4dccfefc6310d5d1e7f964927", @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xf, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000079122800000000009500000000004000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0xd}, 0x94) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r5, 0x7a, 0xfffffffffffffffe}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair(0x10, 0x0, 0xa, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x0, 0x0, &(0x7f00000004c0)='GPL\x00', 0x800, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000780), &(0x7f00000007c0)=[{0x2, 0x2, 0x3, 0x5}, {0x3, 0x3, 0xb, 0x3}, {0x2, 0x4, 0x3, 0xb}, {0x4, 0x5, 0x2, 0x1}], 0x10, 0xb}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_clone(0x2a020600, &(0x7f0000000800)="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", 0x12e, &(0x7f0000000280), &(0x7f00000003c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000d00)='kfree\x00', r0}, 0x10) 4m14.704460503s ago: executing program 3 (id=5789): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xc, 0xe, 0x0, &(0x7f00000007c0)='syzkaller\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000000000000000000000cb19000012", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x185, 0x0, 0x0, 0x0, 0x40000000000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000e200000fbce2a2b139a3a9651c2a43e6be7468678259b14baeefd6e84704000000edf8ee39cbf3eae0e2de0e291d44496d8edab76e32d028fb7dd5dfec5147e48cc2ac75619567bebe00b3efcc02d91e66fee8c287c83a9db5f48c48ac8cadda5b4ad3edda01f3e23bdd28cfa58536640600dda422d08186c0bd8360a2a2ad2c61a8e766599bdb3b61e4e5153afe1e915affa6bba769f585329b19cf354d85ec273c2f13845a73192efe05a8f20000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x1, 0x8000, &(0x7f0000000000)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x20e}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair(0x2, 0x5, 0x84, &(0x7f0000000040)) 4m14.650141115s ago: executing program 2 (id=5791): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x8148, 0x1, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0900000004000000060000000a"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x61}, @printk]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x4004743d, 0x110e22fff6) close(r4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) write$cgroup_type(r5, &(0x7f0000000100), 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xd, 0x0, &(0x7f00000011c0)="5d0703767da080a85769e45686", 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x2, 0x70, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x17, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1, 0x1}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000180)=""/183, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000f9000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008001500b7040000000000008500000058"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4m14.460105348s ago: executing program 2 (id=5794): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000000)='rss_stat\x00', r0}, 0x18) syz_clone(0x8020440, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000560b00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000003e6b659d4fff00"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000002960000000000a850afa49c28a7150000e711613ebb38af5a8579dd14c7fcbf853e0dcbce81dab3bd5d208be6d08b4da686c815f80ae678bb3dd3f6e350798858a940e0c68e31bf74a13e6ef541bff7b76cccfbcbe43ae9e5e2ed36f57d7dc2e4c44eaed52792f9247437c4107bac07a866b50fd7edf2c4e6e96869998f2cff4b8f3807b32f6c8d15566dc720e7fc5332f25ee5dd853ac41aceef395012317d31e60800143c4f743c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14"], 0x18}, 0x8810) sendmsg$unix(r6, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r8], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) close(r9) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@generic={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@cgroup=r11, 0x10, 0x0, 0x9, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f00000003c0)=[0x0], &(0x7f00000004c0), &(0x7f0000000500), 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000005c0)=ANY=[@ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="100000000420000000000000", @ANYRES32, @ANYBLOB="39990668f90000000000000001ac85c8be1e10be583e230843766658b055c48631eb8701a11a89d5a94d716bcd01ae195aba496a4c6f077ff98ff41706554f144adc761a3c170bbd0d86d80f3ebe401ba22848c7face91d2ae19", @ANYRES64=r12], 0x20) 4m13.886338039s ago: executing program 4 (id=5808): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f00000004c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x40}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) (async, rerun: 32) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x100002, 0x0) (rerun: 32) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) 4m13.883639489s ago: executing program 3 (id=5809): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000380), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_freezer_state(r1, &(0x7f0000002b00), 0x2, 0x0) close(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000400000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000f20000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa10060159c2a4040951800f8ffffffb702000008000000b50a0000000000008500000006a600009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x6f) 4m13.825924201s ago: executing program 4 (id=5810): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.memory_pressure_enabled\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc0189436, 0x2000141a) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0xfffffffffffffe09, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0xfffffffffffffe09, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000600)=""/236, 0xec}], 0x2}, 0x23) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0x20}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001800)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001800)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x200}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) 4m13.746236342s ago: executing program 3 (id=5811): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x5}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x80) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x4, 0x2003, 0xc, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) close(0x3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x3, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r4}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) socketpair(0xa, 0x3, 0x87, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xc, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) syz_clone(0x40000000, &(0x7f0000000280)="11b78a11487ee11ef69ddd5bf84e5db113373718136d50d9a622566e532b2b6176de9f803339c2339f6f498030415906c3815c4dda0a1794a0d76f89d37fd4b5df4bf128d3cdf3d3c6e4414e4db6a30b0618db68a66ebb8ff5fc65bda803512ba37e6dc1e48602e9ba076d0a2cc691a3531675", 0x73, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000740)="33dd8bac4b5fcd6f5a41c297c8f50cf11cd0c216f6eeaaae0275198eaa8ac2b5809ac02b09bd38e30e889be886f4f09ed584663379aaf0b9c3581743290609caaac0a6f8ac4e869464a5e3c9939c7e2fd587e85c33afa8d496f1cac5e59edb8e3b2633daee1e79e44381417cc5fd1dfc9c9fd8b1c4eced96fb669ca2153f064e81aa3b167f50b1a07b77a6e6f04819c626aae3f0ffd3e1a97150") 4m13.703106073s ago: executing program 4 (id=5814): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0xff58) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="09000000080000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00'}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000080000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f28bd421850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080), 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000002800)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRESOCT=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ced4fbd44e24eb0d34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3a06d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796efea77aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece72f2090000f44a3210223fdae7ed04935c3c90941576aebc8619d73415cda2130f5011e4845505000001000000004f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c040035cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bf463261135e24d154114df1381b02a0dcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f884cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e1700000000000000000000000000000000000000000000000000000520500002952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9a33c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a62415f78000000005f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c81c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b40824095135861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac00000b0000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e5dd921a5eadd4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293d5c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e602c28ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f257aac5af18d8c6b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e29b10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe8e4cd14dc5c1eb98b63198f6f830745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b51c34a5384f2cf51180c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af243b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380ecf1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f558982d57c556ca1427b5960b79990565ca2a20996fcba472213744d3a156979651596afde2b0089f023fcfccd072bd6ea8445fc787390d71ec61d5b7b0f05f6931914bf49aa0d66eff294271a93e32f54f281068514a4cd2d0700a43df59e9924e4affdbd22405e675e9d7cdc10546571131831d4dc8c8363077a908d9ae4f27ff095f5b07667f93a3573d3fabfca58ee0a6b6a691102bb3c7be4dc5b816853275e7ae8c13ec341bad15353fad794b46c4fd73e1b4cc78de2156cb158870d5b8446dae9ba5f7f244e6cf8f6791671057347208a313ebbcb72b04706005670f2b0055e440d72c7c3316982c6ebe8675458cf6bb393b007f5cedb7bc411834600000000000000000000000000a20071b07d568a8150ed646b4978d0226d9651647a5999ae7c7c85322a215fcdb1adbad63499518fe0d10145d430422c78367dfa941f74b63f3884565ac89c673da2c2b1172be5f2cd1f3f453ebddd432bd24c73fa773b739e20fcec16a821230654a383ac1868495f67d942c772ca75e09073dbe9307ff5cac7c2c411149a4d989a8a019e068da218d4bc34e4102fd2f97397331e4cd70b4915582b635f07ca87f00dc929f902540f565c20add8675b79e005cf0277d954697317b907b77fa5d6b7feaebaf676a2a37de8aa70748fee4bc198ffd3e2de11eb0eff896fd94de0805ba6b1054a7b3e300d4581e9af62a1ecaee96d2819b3d192e5b9561eb622da25450f586be14017a1cf74f89a1dd18af004decfe266134c3d036ae7996931fe6008a73ed34c35f0da4ffee1fe63bc1af6ef1b4731d50b8ceb582a1e9c6e8d97f8290cc105754f592d16ccdb1df8636d7ca5e372cea97dd0f005cc7092b126dd46758917fb0d94b8483d403bd451429cc1660f0b5a529d8134dc2702f6d8e2f943d98fbe50a3ba653f13f98a00fcbf311f9758ade8e4eb87b4b9fb2d387f5d8c4bdcab2fff9ed8c9de961fd831a070381c8020352fea7c334b2959ddd956701a7ea415e224a81c9fa1ebbabe74f7743e09b6c8b72650b51d5c2000ef3679c039b3604374fc1af7ab354204afbd24f0e701bc08a98452ce2668617e85e0d876f5a8b6d9b777f1c384d8a9883e4262defb6b9aab8d5b76bc91ca50f87966797da2499ca0ac76707c0408a7b6d8708fe7714988babdc11f"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r7, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000440)="b9ff03076808268cb89e14f089061be0ffff00fe4000632f77fbac141416e000000162079f7d", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 4m13.586595665s ago: executing program 2 (id=5816): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00082b00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'rdma'}]}, 0xb) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000040)=ANY=[@ANYBLOB="00000300ffffffeffeffffffffffff01aaaaaaaaaabb"]) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002100), 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x8, &(0x7f0000000540)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000640)='syzkaller\x00', 0x7, 0xf9, &(0x7f0000000080)=""/249}, 0x24) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x6, 0x4, 0x9, 0x6}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001ec0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000001dc0)=""/219, 0x26, 0xdb, 0x1}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x1, 0x0, [0x0]}) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) 4m13.508048507s ago: executing program 4 (id=5817): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000021c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r4, &(0x7f0000000cc0)=ANY=[@ANYBLOB="fb03e49685e3"], 0xffffff02) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 4m13.248652741s ago: executing program 2 (id=5819): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000280)=""/260, 0x104}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='signal_deliver\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000014000000110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) 4m13.239637432s ago: executing program 4 (id=5821): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12c, 0x12c, 0x3, [@enum={0xd, 0x5, 0x0, 0x6, 0x4, [{0xe, 0x5}, {0x10, 0x1c57}, {0x10, 0x200}, {0x4, 0x3}, {0x8, 0xd5f3}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0x1000}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x1}, @struct={0x6, 0x4, 0x0, 0x4, 0x1, 0xfffffffb, [{0xd, 0x3, 0x3}, {0x6, 0x3, 0x4}, {0x3, 0x2, 0x7}, {0x2, 0x2, 0x5}]}, @typedef={0x9, 0x0, 0x0, 0x8, 0x4}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0xf, 0x4}, {0x8, 0x1}, {0x6, 0x4}, {0xb}, {0xf}, {0xf, 0x2}, {0x5}, {0x2, 0x1}, {0xb, 0x4}, {0x7, 0x3}]}, @struct={0x7, 0x2, 0x0, 0x4, 0x1, 0x2, [{0x10, 0x4, 0x1400000}, {0x2, 0x2, 0x3}]}, @ptr={0xd, 0x0, 0x0, 0x2, 0x1}]}, {0x0, [0x30]}}, &(0x7f0000000000)=""/63, 0x147, 0x3f, 0x1, 0x1}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x7, 0x4, 0x8, 0x1, 0x8090, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @value=r0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1, 0x5, 0x2, 0xffff, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x8, 0x0, r1, 0x8bff, '\x00', 0x0, r0, 0x4, 0x5, 0x1}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={r2, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8e, &(0x7f0000000640)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x83, 0x8, 0x8, &(0x7f00000009c0)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x29, &(0x7f0000001040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x401}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ldst={0x2, 0x2, 0x2, 0x9, 0xa, 0x40, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x9}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @call={0x85, 0x0, 0x0, 0x1e}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000e00)='GPL\x00', 0x1, 0x41, &(0x7f0000000e40)=""/65, 0x40f00, 0xdc2fe2a879869fa3, '\x00', r5, 0x0, r0, 0x8, &(0x7f0000000ec0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000f00)={0x4, 0x9, 0xce}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000f40)=[{0x1, 0x1, 0x10, 0x6}, {0x2, 0x5, 0xc, 0x1}, {0x2, 0x5, 0x9, 0x4}], 0x10, 0x4b0e}, 0x94) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r9, 0x4004743c, 0xf0ff1f00000000) recvmsg(0xffffffffffffffff, 0x0, 0x40fd) r10 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r6}, 0x8) close(r3) close(r10) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r6, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_DETACH(0x22, &(0x7f0000000340)=r10, 0x4) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r12, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{0x0}, {0x0}, {&(0x7f0000000140)="bd", 0x1}], 0x3}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 4m12.845787469s ago: executing program 3 (id=5828): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0xa8000, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x9, 0x1, 0x7fe6, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000040000007b8af80400000000bfa20000000000ee07020000f8fffffdb703000008000000b70400"/72], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)=r3) close(0x3) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0xa8000, 0x0) (async) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x9, 0x1, 0x7fe6, 0x1}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000040000007b8af80400000000bfa20000000000ee07020000f8fffffdb703000008000000b70400"/72], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) (async) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)=r3) (async) close(0x3) (async) 4m12.569885955s ago: executing program 3 (id=5832): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xf6803, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x2}, 0x50) close(0x3) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) close(r4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) close(r1) close(r0) 4m12.438807367s ago: executing program 4 (id=5835): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1d, 0x23, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7ff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @tail_call, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa}}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x0, 0x9, 0x6, 0x5, 0x1, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3842}], &(0x7f0000000180)='syzkaller\x00', 0x8, 0x4d, &(0x7f00000001c0)=""/77, 0x41100, 0xfbdd366e7d711673, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x0, 0xffffff96, 0x30b}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f00000004c0)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x3, 0x4, 0xc, 0x9}, {0x3, 0x2, 0x0, 0x8}, {0x5, 0x3, 0x2}, {0x0, 0x5, 0xe, 0xb}], 0x10, 0x4}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000006c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={@cgroup=r3, 0x15, 0x1, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000700)=[0x0], &(0x7f0000000740), &(0x7f0000000780)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={@fallback=r0, r1, 0xf, 0x0, 0x0, @void, @value, @void, @void, r4}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xe60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xe, 0x3, &(0x7f0000000000)=@framed={{0x6a, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x41}}, &(0x7f0000000480)='GPL\x00'}, 0x80) socketpair(0xb, 0x3, 0x8, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000880)=r6, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1d, 0x23, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7ff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @tail_call, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa}}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x0, 0x9, 0x6, 0x5, 0x1, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3842}], &(0x7f0000000180)='syzkaller\x00', 0x8, 0x4d, &(0x7f00000001c0)=""/77, 0x41100, 0xfbdd366e7d711673, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x0, 0xffffff96, 0x30b}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f00000004c0)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x3, 0x4, 0xc, 0x9}, {0x3, 0x2, 0x0, 0x8}, {0x5, 0x3, 0x2}, {0x0, 0x5, 0xe, 0xb}], 0x10, 0x4}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup(0xffffffffffffffff, &(0x7f00000006c0)='syz1\x00', 0x200002, 0x0) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={@cgroup=r3, 0x15, 0x1, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000700)=[0x0], &(0x7f0000000740), &(0x7f0000000780)=[0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={@fallback=r0, r1, 0xf, 0x0, 0x0, @void, @value, @void, @void, r4}, 0x20) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xe60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xe, 0x3, &(0x7f0000000000)=@framed={{0x6a, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x41}}, &(0x7f0000000480)='GPL\x00'}, 0x80) (async) socketpair(0xb, 0x3, 0x8, &(0x7f0000000840)) (async) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000880)=r6, 0x4) (async) 3m56.76188829s ago: executing program 42 (id=5836): bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a40)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x2f, &(0x7f0000000480)=r0, 0x4) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00'}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000001000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r6 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r1}, 0x8) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r8}, 0x10) gettid() bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='fib6_table_lookup\x00', r9}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000080)) 3m56.74818328s ago: executing program 43 (id=5833): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000e00)={r2, 0x0, &(0x7f0000001780)=""/4088}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000"], 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0xa100, 0xc8, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000540), &(0x7f0000000740), 0x75, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r8}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0d00000004000000040000000700000000000000", @ANYRES32=r10, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000002"], 0x0, 0x26}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) r11 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x5, 0xdd, 0x10, 0x5, 0x0, 0x3, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f00000001c0), 0xe}, 0x100000, 0x0, 0x4, 0x7, 0x8, 0x72, 0x1, 0x0, 0x5, 0x0, 0x2000200000}, 0xffffffffffffffff, 0xd, r9, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x40082406, &(0x7f0000000400)='\x00') 3m56.716683941s ago: executing program 44 (id=5819): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000280)=""/260, 0x104}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='signal_deliver\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000014000000110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) 3m56.701773751s ago: executing program 45 (id=5832): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xf6803, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x2}, 0x50) close(0x3) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) close(r4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) close(r1) close(r0) 3m56.671799871s ago: executing program 46 (id=5835): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1d, 0x23, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7ff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @tail_call, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa}}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x0, 0x9, 0x6, 0x5, 0x1, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3842}], &(0x7f0000000180)='syzkaller\x00', 0x8, 0x4d, &(0x7f00000001c0)=""/77, 0x41100, 0xfbdd366e7d711673, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x0, 0xffffff96, 0x30b}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f00000004c0)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x3, 0x4, 0xc, 0x9}, {0x3, 0x2, 0x0, 0x8}, {0x5, 0x3, 0x2}, {0x0, 0x5, 0xe, 0xb}], 0x10, 0x4}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000006c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={@cgroup=r3, 0x15, 0x1, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000700)=[0x0], &(0x7f0000000740), &(0x7f0000000780)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={@fallback=r0, r1, 0xf, 0x0, 0x0, @void, @value, @void, @void, r4}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xe60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xe, 0x3, &(0x7f0000000000)=@framed={{0x6a, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x41}}, &(0x7f0000000480)='GPL\x00'}, 0x80) socketpair(0xb, 0x3, 0x8, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000880)=r6, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1d, 0x23, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7ff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @tail_call, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa}}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x0, 0x9, 0x6, 0x5, 0x1, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3842}], &(0x7f0000000180)='syzkaller\x00', 0x8, 0x4d, &(0x7f00000001c0)=""/77, 0x41100, 0xfbdd366e7d711673, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x0, 0xffffff96, 0x30b}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f00000004c0)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000500)=[{0x3, 0x4, 0xc, 0x9}, {0x3, 0x2, 0x0, 0x8}, {0x5, 0x3, 0x2}, {0x0, 0x5, 0xe, 0xb}], 0x10, 0x4}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup(0xffffffffffffffff, &(0x7f00000006c0)='syz1\x00', 0x200002, 0x0) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={@cgroup=r3, 0x15, 0x1, 0x0, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000700)=[0x0], &(0x7f0000000740), &(0x7f0000000780)=[0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={@fallback=r0, r1, 0xf, 0x0, 0x0, @void, @value, @void, @void, r4}, 0x20) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xe60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xe, 0x3, &(0x7f0000000000)=@framed={{0x6a, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x41}}, &(0x7f0000000480)='GPL\x00'}, 0x80) (async) socketpair(0xb, 0x3, 0x8, &(0x7f0000000840)) (async) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000880)=r6, 0x4) (async) 25.738129493s ago: executing program 5 (id=8704): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x7}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) (async) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x3}]}, @ptr, @restrict={0x1, 0x0, 0x0, 0x4, 0x4}]}, {0x0, [0x2e]}}, 0x0, 0x4b}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2], 0x18}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r0, 0x4, 0xfffffffd, 0x4000002}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e00", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0100000001000000050008000100000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r9, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r10}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 25.603378686s ago: executing program 5 (id=8707): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x13) ioctl$TUNSETLINK(r0, 0x400454cd, 0x306) 25.478377498s ago: executing program 5 (id=8708): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000180)={@fallback=r2, r3, 0x10}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)=ANY=[], 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000001008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0xc, 0x9}, 0x50) recvmsg(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc786b409ac930c90ff90f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d858952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09e3187a10d905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367638cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a2d4f12e8e717eaaa2a6d14fee0c15f36c203dbc7c06128bec84231d43e152ef19ce027436fb4ebb9fce431b913f4817597a6f53d1626f9d1cb7b36fb18ac19547a8b20ede70c81a75686cea85dcd34408128da7cab045541bc6b9a0a79f63f2e7646356e04b977c9f47467537015240b974184be9c54b7c628ae4d97ebdb06070344468994afbaac71e5ffac2c61d9af66f9de2760a38e968a781528531c1c936a02065be48f1eee77be878873206d65bd0b1241fab9139abd7f40febe81fed3684e6b59273da01f1743c6a5df300ec59c65e8174fc2d95a62ca7b937289ad14107333007eab833a5849eb19f18ae41743dfb949377e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) ioctl$SIOCSIFHWADDR(r0, 0x5452, &(0x7f0000000a00)={'dvmrp0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x13}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r10, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r9, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 24.727283123s ago: executing program 6 (id=8721): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000029000000080000000800000000000000", @ANYRES32, @ANYBLOB="fcffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r2}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="01000000010000000500080001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r3, @ANYRES16=r0], 0x0, 0x9c3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000e}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x10000) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'gre0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x13}}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfffffffffffffeba, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r5, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0xffbf) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x22820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x10984a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff}, 0x0, 0x1, 0xffffffffffffffff, 0x3) 24.599815475s ago: executing program 5 (id=8726): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x16, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0xa, 0xfffffffffffffffc}]}, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x24}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r3}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 24.525413397s ago: executing program 5 (id=8727): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a0000000500"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000040000000400000009000000000000003e728d5a9ce63e431c051852f39e04853fa7bdeca846d71baf10394cf7e121d304cccce2a0baeb308f9c726b6ba525381831164bc0b9b24674a34bfcaa8f1cdc18bd5f3a14f71b614c324629ea9429245cc76f2fa31acf7e2b1b3d65750967b4", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000680), 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x10, 0xd, 0x5c9f, 0x948b1f24dcbddc34, r0, 0x10001, '\x00', 0x0, r2, 0xfffff800, 0x5, 0x4, 0x5, @value=r2, @void, @value=r2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r3}, &(0x7f0000000840), &(0x7f0000000880)=r1}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r3, &(0x7f0000000d40), 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf000000}, 0x48) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x7, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3046, 0x0, 0x0, 0x0, 0x4}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0xe}, @exit]}, &(0x7f0000000040)='GPL\x00', 0xffff, 0x0, 0x0, 0x40f00, 0x34, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x0, 0x7, 0xf3}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000380)=[0xffffffffffffffff, 0x1], &(0x7f00000003c0)=[{0x0, 0x2, 0x4, 0x4}], 0x10, 0x8}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='rxrpc_peer\x00', r6, 0x0, 0x3}, 0xf) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0xc, &(0x7f00000000c0)=r9, 0x4) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x7, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES64=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000095", @ANYRES16=r7, @ANYRESHEX=r4, @ANYRES64=r9], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r10, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) syz_clone(0x100000, &(0x7f0000000300)="7309482cf2a8a4cfccbc9af321fee7d243e311d866a2f432ec5c711870a779a99075368f7604bb89817340bf75d62b85d7aff305832f810439482276b0093ebab87671ab35b4773af7fa329aa11085e3f4f61be5aad147be77dbb6", 0x5b, &(0x7f0000000140), &(0x7f0000000240), &(0x7f0000000640)="5cd9") ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c230000) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000ff01000000000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x10) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8602, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(r12, 0x0, 0x66) ioctl$TUNSETOFFLOAD(r5, 0x541b, 0xf0ff1f00000000) 24.444922358s ago: executing program 6 (id=8730): socketpair(0x28, 0x80000, 0x2c0000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, 0xffffffffffffffff, 0x840) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x3}, 0x50) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x50) sendmsg$inet(r1, &(0x7f0000000600)={&(0x7f0000000140)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000180)="42262a5f11933aebbbea7b0696875ad2fc28c7d16824ec27c9c535e7fb94ef8cb08cf7fcb8a93b2fc9aa01b81290f812804e9b02e42436f34df152065544868d113ecca9d2315d43628e667babc97f745d707711e465c111163449ec87680d91a3ae541eb784a3406faa89d98b3aaad7c58513de402ca21a814edd9935c0dedb087b9a8aa81ba8d539574fddc719f07f0fbf3f036c36788327b60939e16a0e1e12bc7e795ab8be9d731952ceed77f4dfb5cb88677f524a59406efc9965daec", 0xbf}, {&(0x7f0000000240)="c5074f492958133f417247677b7fc582663adbe88bd0363527feea77c1bb310b486155a169d93c9e71136068e2a0dee72a", 0x31}, {&(0x7f0000000280)="56766a7cb2bf3e7d6befb553a659a3b39c2cf983567bdd95d800286d7cd1a2a7678b89936707d212862d67b5dbafc5bc89d40070a86064f62c5307375eae49e17237948f79bcf5bf68caf5ec91796924b872eef29ffa7955f3ab192d77d74efdc56995070475ec55412d1a553792c615cf4a91fb751de1f5cf30bf5decd4256f4f24a9584613690c569959805973add5e58aee03155eb80cfde155aa62d01200f69308ea1845059619d797a9ea32a502c7", 0xb1}, {&(0x7f0000000340)="2d6de45c1c43dc69f115109094c4245b55bd39d020ce691a66ce1ecd34ef2908fa0d7b37dead887212ba0d799df9988370e859b71e13f6dfee9a491b458ec01f0f6eb02c9ec2b629f124175605064f078cb68c80c8f052d1dcd69fe23cee83e901bf9baaec536e7866a722869309fa9b71fff70317f944ce1e80584b3d43fec1517f9d38b9d943ef5874e1ed8619a23c3ce22b64193d886b73c018885af8a5812c9b4b6ad700", 0xa6}, {&(0x7f0000000400)="d02652285e454d7344061e1536d1438c896a89e88153100e9afd46283d55e2279fb6b23d980fc6e271b1d0817fbdb65aa47d609e18ceaa1059a4621ed7e7f5823e98e3c8337b40096aa33f990e1f22533402704458216e66c40f840a77470ebbce976614defcd6", 0x67}, {&(0x7f0000000480)="f2eebff23188a899b4d1046fae35e1f8e3a8e5547df9a6fac0e7b53d07a22fce5a13e72923fdbbd6b64fd651e86138014a362dd235e35ad0c29f6c44ca59f0d9bf4ab17e35a34cdcd5f37820a1d57a2e81607dbbda385b28e93b7d5d8083679988615e853480b6f04cdea7483b0db9667282dc7baa08fa69e41c737825c03bf65ff3eae48b50ae164ac7c2b813509d4b0e04f724b35c98716ffec57458406b19b6598c5439c80b83c27f22e19bc951dade1e3ea34d142f30d1147114bb17e0ad847390f33091ed5b40863e09b8274768de2388b71b", 0xd5}], 0x6}, 0x4) recvmsg$unix(r1, &(0x7f0000000900)={&(0x7f0000000640), 0x6e, &(0x7f00000008c0)=[{&(0x7f00000006c0)=""/37, 0x25}, {&(0x7f0000000700)=""/131, 0x83}, {&(0x7f00000007c0)=""/234, 0xea}], 0x3}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001ac0)={&(0x7f0000000940)="50b124cc7fa181e467b1a5d972f374aaa423ad1dde05ad17e8", &(0x7f0000000980)=""/4096, &(0x7f0000001980)="ed4f7c0165aef1a67ce04bd6b953655a3ccb3b68918bf40fbbcc4957c1692e66ce1a21cdd7bd68885c988a2b1372373d4df602261b704ab3dd719a18d3765f0f4a4e50c99821a856295cd96585578dfe9e7735ead197ee8e2f8d46772bb8246770858679bc69455215ae72dd92879471689522aa14d6af68041b5116ca45cadd1e13fe57c80089fb7aae5d82af7617dc15050ac805bbe0eb9116cc79bd53", &(0x7f0000001a40)="f1d8630cc2ce6c7b6e151333653ab518665db67f4ba572dae15a287a459a52ac811bacf42bdb7d2ce0e83eb5d4e3b270f00ec0822b48953f8bae9b04995f42a1d5ccbcf5c720642b1a492dea6ec0e199428e0706f4", 0x8000}, 0x38) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001b00), 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d80)={r4, 0x0, 0x44, 0x59, &(0x7f0000001b40)="13c716c3bd0899d5da5b8ae5c0f68000256bc6272d3debd89169dc938c00ef71768601a6270d303bb6f457a318e467af7609c7085757f3f333a54792c8a3171112166c27", &(0x7f0000001bc0)=""/89, 0x7f, 0x0, 0x7f, 0x90, &(0x7f0000001c40)="6497608cf025b1a7b359ae9fc41515b41bb7a7eb786e30b247a1e0b7238c3df89472b7a0bff85e7e91ba32015cb2e5b62bbb0332ddb064776490fd8671d13770be14b5cb0c0133d7cd530d15bc375197e18d39f3a131150b514242d0fabcbda1a4123ccbe3e661b0793f6050c34dec2aa65c96f63ffc69ca7d62f94b36cc58", &(0x7f0000001cc0)="36ceea3921c013700a0af75136408c5de8024e6e660dd2813898e17b98ba60097993034c8268b4dcfcc91c0873a7eaa8ee8c7327752e1febdc66d44edae0fb39e252467e9e848815f38487f2be5ad98691aa7a478d9dfd5ee87e147067a0164ff8f41ad1b253e9d4d25d5130cc3f29d2bf8aa744a770f598533839448462e7cb69d282c328941af0ea01de0e918ed625", 0x3, 0x0, 0x778}, 0x50) sendmsg(r1, &(0x7f0000002180)={&(0x7f0000001e00)=@l2={0x1f, 0x42e, @any, 0x3ff, 0x3}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001e80)="15ce6409c637b56519f238ffd80fb86e5707a802f96008423fea4c3efc4aad55d2add255027392821eda36c8e324386ae3d18f3f2bf9231f32d87772c04b53bfc323b766d4c3c452ccde0bbc5df3e3db4f14e5afce9d14a807d74649e85be5a07cd23ee31783eea21625fb14d9897c00d24295e7", 0x74}, {&(0x7f0000001f00)="7ddd13e9b30d0787c4f4528c14891ba4035307d648936761820bdd995ffcd6344d4d55e05fe7cde64e3fcef1a850ced4ec813fc2c3889829fe8e27da1c9902f0", 0x40}, {&(0x7f0000001f40)="f75e0eb7fa9d4d2eccdf97d23b521da21817922425e1d551ec5a011b2731052a0fd2b073e1d8703f6fa2fd7a548fbca47f6e9621d589d99aed8a2e87f96e057ab15920c3154875bdffe3243913002981687d87027b1c608e3d95bc0dd8951d3c7e75f76c816f0e160006808a1a3a439b9c32f52805b087b05d37cd6703900990ab6e38a138ed36efd3c217f84c3035ef10c80aa1d98db36454cd7226060622c79ac95d01051fa632fa475f", 0xab}, {&(0x7f0000002000)="f9ca2532748eb77b96bccfa7ad94e6e8ed4df153d28719b2cebc7cb6a867db4b88d46520f3996570c643c0f2215c9ddd9c35826f02f471db150e291cc7b0b23016695d5306d176d5dab3f566d66fb9b152558e9ca484d10c51d5a579a02118e32a5e9db6b9e83e8c47c876597c943124d032137f", 0x74}], 0x4, &(0x7f00000020c0)=[{0xa0, 0x101, 0x2, "575adb11d946a06218841612f213a7c8f5e803d17eed3f5b5b5d151e4978e36fe38843e8f7e916d7697c3fb699c4291751a2161c6731a5fb8a54a2c89570eac0883d7c4e08d46a87be2047b6c9b4f6169a21abf111d91841b82c85d12e9d2b7c1e310aeb208a05c6686c5a7c688309839dc2f68c7f16ef5b186e1b04278c1ff95ac672d815705d274f35f4a7688a"}], 0xa0}, 0x40) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000021c0)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002200)={r5, 0xffffffffffffffff}, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002400)={r2, &(0x7f0000002240)="870e23ff47266b475928937ea995b5e6ae6abba7f1e062e5cfc0effbbdf8b9dc59b9085db346aeeb71f3a719960ceac411d0d64d6968262184a44fe6bdf9e5e19ff5f71311abbd40ac33ded3dc00752198842ba77aa7e7192b7efb6f4f1f74e1383c4f6eb642a9f828866e54c0d5e5e7de94e78ab9719cfb7c7c673677f7170fef4e8f674297fae3953745a3481312f2ebe2cc2f68343a424806f6e7e455bdf0c77615cf5aedf02fe145aaf6611dc10a58709a9509b8ccc69bb2b22e425b0dca9da2a52d7752cd006800c2", &(0x7f0000002340)=""/144}, 0x20) openat$ppp(0xffffffffffffff9c, &(0x7f0000002440), 0x400000, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x7) write$cgroup_subtree(r4, &(0x7f0000002480)={[{0x0, 'io'}]}, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002600)={0xffffffffffffffff, 0x20, &(0x7f00000025c0)={&(0x7f00000024c0)=""/110, 0x6e, 0x0, &(0x7f0000002540)=""/118, 0x76}}, 0x10) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002900)={0x6, 0x9, &(0x7f0000002680)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000002700)='GPL\x00', 0x2, 0x27, &(0x7f0000002740)=""/39, 0x41000, 0xa, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000002780)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000027c0)={0x4, 0x9, 0x8000, 0x7a5}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000002800)=[r4, r4, r2, r6, r5, r2, r4, r2], &(0x7f0000002840)=[{0x2, 0x5, 0x10, 0x5}, {0x5, 0x1, 0x8, 0x6}, {0x3, 0x5, 0xa, 0x5}, {0x2, 0x5, 0xc, 0x1}, {0x2, 0x1, 0x4, 0x9}, {0x4, 0x2, 0xa, 0x4}, {0x4, 0x5, 0xd, 0x1}, {0x0, 0x4, 0xb, 0x2}, {0x2, 0x1, 0x3, 0x8}], 0x10, 0x6}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002a00)={{r4}, &(0x7f0000002640), &(0x7f00000029c0)=r7}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002a40)={0xffffffffffffffff}) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002ac0)={&(0x7f0000002a80)='rss_stat\x00', r4, 0x0, 0x100000000}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r4) recvmsg(r8, &(0x7f0000003140)={&(0x7f0000002b00)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000002b80)=""/103, 0x67}, {&(0x7f0000002c00)=""/121, 0x79}, {&(0x7f0000002c80)=""/163, 0xa3}, {&(0x7f0000002d40)=""/39, 0x27}, {&(0x7f0000002d80)=""/135, 0x87}, {&(0x7f0000002e40)=""/78, 0x4e}, {&(0x7f0000002ec0)=""/227, 0xe3}, {&(0x7f0000002fc0)=""/249, 0xf9}], 0x8}, 0x1) socketpair(0x11, 0x4, 0x2000000, &(0x7f0000003180)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003480)={r4, 0xe0, &(0x7f0000003380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000031c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000003200)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000003240)=[0x0, 0x0], 0x0, 0x51, &(0x7f0000003280)=[{}], 0x8, 0x10, &(0x7f00000032c0), &(0x7f0000003300), 0x8, 0x26, 0x8, 0x8, &(0x7f0000003340)}}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000003500)=@generic={&(0x7f00000034c0)='./file0\x00', r3}, 0x18) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000003540)=r3, 0x4) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000003580)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f00000035c0)='\x00') sendmsg(r8, &(0x7f0000003b00)={&(0x7f0000003600)=@can={0x1d, r10}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003680)="7532f4f7a352b54891f420520fd17deba4dd818879df9e208b62ac816b92c546a4b3bced17e078fa5b0bd151645f873dead91727bc027667a74fdddd4dfaf94f1a1eec569d1013c204c8f80ad6e84dc82d35a3e65d86c6679eebb8001fea1763fd95176bb78be1139ee664cfbd6cacb94d080254840546e7c6f68024d351197c5c67f610cdc2275c9164e20146527a9ebf2a2e48942284b05945a318315632f1147eff9a826170ec384cac008dae4234281953cfd52f8c803813b708a6d9965ec3a794a734ad", 0xc6}], 0x1, &(0x7f00000037c0)=[{0x98, 0x10c, 0xfd, "35b99acb4c7978c2d539d8afc9ac80d0969ba55127770602c90010bb4a30910321f1be25039f502d80f46f8d09138605a05e513002a073ebdcf8eb4c88a710c815f7129f00639fa7ee1efd66b6353597807598d8b14cda3f436e027310016cc9d3535e3b244e34e0ebf7c1451736a56ef4fce9e0918aa261ff4f5e3fd85d8374a0026fb16d"}, {0xe8, 0x115, 0x5, "6b65e237fb72292dcae5555a42ebf1fb1e0aa3d728da6c15361ea925b27eab8039abfeac6fd6d3cfb15b35672555d6f9b080f33e3436b73173d8c5aa4a977770ad573bc25cd3351dcf4a9db0c915f684786ca69ed108dc177597d19ea07dcc1da1fc5bba822b4c15035c81394896e1e9c3120b1616c1fca1248133d8e4a7f6b61227b8b4f1a5b6572d44e80218b9f35b5341aae2d2f8f5fbf56614e53366235cce4011299001b2b09d27f0d6d76e16e3066dfe3a96ac67e8b06ca5d0fbdb4a93eedd286e1bf58e9abf37bcab50352a5885"}, {0x100, 0xff, 0x0, "13f3eee2a3ecd944afa73fafed0de7f08fd1b8becbfc1d6fa7237229a3c5c49033cf01d62ae99363d1c07175a8b7c200fcec1cb00a856e9aa7f395c08f2cfa0dfed908db9605fee2fa2bd175be5c93ffcaa66782af13a5fb4db420c9aaaa4f8611ac7309c442f7062c408e19c0a1f3e0ed7dd5f674bedaad15d35408e6ad9a45e180ae0f5a7f458536d8998421511fa6a2d15122e8e322b0024f1f661dd9dea13ea6afacea6f9d7af8c243f39e1ff20212ef8ad897d811f994bde8ae5f36fd81175375bcc32de32f7ef882a9379a3dff8636f88b5bc0493d470a58893386b47e6c164a91715b27cb8cbf5c80f93528"}, {0x60, 0x110, 0x101, "70f9106b75fcb5faee20b13bf436bea45d3b141cb620a5f70fd46212dce400d5bfa35c9af10415d7581c1d2c1f0f1b0e4f218f124d37449816ce3c8894c671676094a51e793631849d26a35d20e78233"}, {0x40, 0x101, 0x5, "f54023312e0cbc6c7fa1ab356f145b7f99f33786ef16201909ea28e39521140c33f36569d06b5a38e31d5883bfe9"}], 0x320}, 0x40d1) 24.33773724s ago: executing program 6 (id=8732): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r2, &(0x7f0000000080), 0x0}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000079100000000000006308e0ff000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x2, 0xc4, &(0x7f00000002c0)=""/196}, 0x80) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=ANY=[@ANYRESHEX=r3, @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) close(0x3) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) 24.227520003s ago: executing program 6 (id=8735): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040200000800", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x40}, 0x94) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (rerun: 64) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) (async) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000091b17481b668424000200000408000000000000000300000000000000e9ffffff020000000000000000000000005b9302000000000000000000000004"], 0x0, 0x56}, 0x28) (async) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)=ANY=[], 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_ext={0x1c, 0x1d, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0xb, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0xae}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}, @ringbuf_query, @alu={0x2, 0x0, 0x0, 0x6, 0xb, 0x6, 0xe}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @call={0x85, 0x0, 0x0, 0xbf}]}, &(0x7f00000007c0)='syzkaller\x00', 0xff, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x200d8, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[r1, r6, r6, r1, r4, r2], 0x0, 0x10, 0x80}, 0x94) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (rerun: 32) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="000000000000e600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xf, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 24.190461483s ago: executing program 6 (id=8736): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x3}, 0x10}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x81, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xc0, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf8, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback=0x13, 0x0, 0x0, 0x0, 0xffffffffffffff91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000002240)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000f0ffffff7a0af0ff0020000079a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7050000000000006a0af2fe000000008500000087000000b700000000000000950000000000000000e154cd8445974b26ffffffe4fbffffff55bb2007ee51050512b5b42128aa090a79507df79f298129daa7a6b2f91af50342115e17392ac627c87867c000006146001e04aeacea799a22a2fa798b5adc43eb27d53319d0ad229e5752548300000000dbc2777df150b7cdd77b85b941092314fd085f028f2ed1a4535550614e09d6378198a6097a670838337af2abd55a87ac0394b2f92ffab7d153d62058d0a413b2173619ccf55520f22c9ca8b6712f3024b7041b1df65b3e1b9bf115646d14ce53d13d0ccacda1ef0900094fa737c28b99938512c816fdcceaede3faedc51d29a47fc813a2ec00f4c7a53ac271d6d7f4ea6bf97f2f33e2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804da4f86bb47a4a69bf9bc5fa96ee293fbd165a5a68488e40b030166565a097b1b44b451de736bb6d43db8db03d4b7745fef1d04ec633dee254a6d491b849a5a787e814c4fd21a18986252a70f8f92eb6f0e8c7db4bf23242a1f2c28159f09943b1b0452d1b72183aacf4a84f9130b775dd4e9e3070756f97ad91935a6ddfa8f90e79321a0574fb30ff0000001989328c8ddc20ea011bf5742e0e0d4334db8b20ce3f9f16cb7fc20fb4791ec85821d0c48fb657c29b309c73f0977e7cde65a82b94c461d7962b0d2277a84af326f37f3e2c25a61ec45c3af97a8f17da954aff3fc8c108755f75ca13fb7c8bbd8b6e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41a2d8bda74d66f47cc180f82c5f573c1f860d050d694cc7806d294d3665016a7b29da0fde4745db06753a7ac74a2d32f7528751313694bf5700b20ef0c248ddd3da32396a614cacad4aff2066bb5d40887c58559b7dcb98a6273b8c651e57f727041c62cea5b7bd24d9f679e4fbe948dfb4cc4a389469608241630459f0123fd39206000000000000eb55dad46de56ef907b059b90b8aa49afb9a79ae5498f6589880ed6eea7b9c670012be05e7de0940313c5870786554df26236ebced9390cb6941b83720eca291963eb2d537d8ee4de5c183c960119451c31539b22809e1d7f0cda06a9fa87d64cb89872a2cd8a104e16b0000bacf13464ca03aff14a9aa4bd9539f5096412b92012e095b84c20243ff98df3347f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b9d3fa02208d304d455c36300000000022320178b00cc6ed7966130b547dbf8b497af002000000cd1d0000002000000000000000000000000928ee53595a779d243a48cea769470424d28804c04b2c4324ab7f4a5c81921f0128dfd70b438af60b060000000000000056642b49b745f3bf2cf7908b6d7d748308eea09fc361b4735efbf3411718d6ee7aebed161980f2fde4f9ef679dbfae9fb4a79f8a836804ed3a1079b0282a12043408cd60b687dcff91af19010000000000000000456f7d2a42bd13da202274f20675eb781925441578e93046aaddea8ec4ca37f71c2710a7ea8ae0dc214e1cc275b26adfa892e6de92000000000000000000ddff004cff9ec780f535e62f4eeee50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e9338c73de2f04f15d005387577f480000ea65559eb00e76e9d0ada201bcbb5c252b28a60ca770663da451790cc3600040543a34b195c6a8fc054282cd41b264906d5a9fad98c308e39bd5ffb6151d79c1cee1cd102e3c8e63e9fba05e3633be3f00000015762e5f5a3a0bc33fdbe28a5ffc83f2b485185cc92fe7f791e8f6429309d6adab4b7e508e4bf024ed8f8a005f2bbf96c89739f5cf1e750d50517a59a3ad09e8802e8f4f535447cc0fc9d5f99a73145dfcedad69da9cd4375c624600e78f4458542b14f29611f95d4a31838eeb20c20bb82aa31771cd379ec83554cea5e6539db7384e1f58d81f2f2653c4d9818708e27c89b552d7fcd116bce9c764c714c9402c21d181aac59efb28d4f91652f6750b6ec962802c0320f8059195729d60c534ee8e8ff0755b67fe4c25edb85bcff24c757aa8090000000000008c420eb4304f66e3a37aaf000000c42a570f0e9dd5fd545470f862f8c3c14fa9ecd1e877b0d8ca84c044859e85e6158f9184bc61a9a284db80e4636c25b96174327d82761c26e329555f9290af41000000000000007f5ab0d534b8d63e4ca3be71f2de1cdf519192c6b59a601fd419adc16e2055b85058f793484305d7a1759782e4c571ee855a47bc00edf5e9020c09ab004321610b857e8717764b633b21cb32f0e03280e09758bd445ab91d20baca005452b79d7b574a247f1d2fe45b3c4e93da3d51de647c10dd49944dc87c92332af0be61e58c79d497247d278888901d442ad7f8536607a644e9e3d769db497c3960dfde12182334caee994adc38a436367a54b9e182b78e9a0ceb9a2c4f63902c1ad1a7c5a08d0920a23c2a86abbdf357849a651733097f31019876026888c8ccb85c86b4f8ffffff7f000000002c331fca0e541b7ca211c28ed61c525708a13d115b43f8b1894c8fa8a14dc4810f61ae96c18cc7130000000000002100000000000000000001000027c9a46157a3609b6fd9843ee19ec647249a9375de5858818f3c4a4fa6ce46f4d42b07199de8b99231ace58c77819ee214e49666c464d35ca9b5143ed3b3dc8c17a23692759ccf5a205311b7ab22532697b861dfb54609fd88e6043bd52ae84c1bb0c8a6c769f952283a1f4e3842edb3d42c0e8ebc62887aa46e820a74f91381dcc198e353047db70686d147357024eb3cb94f1e89cb5ba0a56aa046b4dc521a3d9356b4b8b5917c4c860495b240e80063bde261fd00000000007271e28ef6806bc8e139c49b91c76bea3858f7f05b47d3e519f1634e8fbd8d31330d89069f9648a2ff93060ff073b3a113e47edf76f7d116d2b0976cf2ec447c030931651dd315003b7a6a5433a2bb560ae99e85b227eda2e63a1c31a2c2bd48a822cbe92b6524e0cd8020ecaa34e19e7141d5e221509342bfe7d294d1eb3de6a50ca0301f89c2ee627e949c68b3a4a426a996d503a26e9a714ee5f72d8805dd1bfbd081f6a5359dbdfbf31a562395020becaf3fd1f1289dfe14cb9194e26a44fac273461fc5c0e0a33db7f2d43ea8086cf059f40fa2640b6bfb74dd35f5a31059c01517cf4b6641fce9a24b96767b837ca037a1199735c375c705c798e0e208e4a5259d0bfa526b462af45a6eab34000000000000000000000000c4426344ec1a3366515dee221e747f55d7dd02534bc503b9b28277c253e410986bef2111a99cc448d652929f8a67a6a1d3f00dcad91aff428aade3f85714a1d3ef29acd4d49b62339c10c2ec0dac4b28288e78980c1184d8223edbc4bf9258b7374e79a1f8bf3fb73c8c6dbb7bbdfc399847a11921f97eba0ea14c4fed9a71eedb97c02461792e3a49dac16c60c3fcaab222025d78963c3ac899fa8b63f58a30212c9b2d7fe751e2046b78f86e22861b6504c667350244dd6d9189a8b9c45f8aaff9db694811ca86ed978f23eed7459c0382074170cf1e25b0e9ba3d1cc309353eea4cd8ab96bafda393276bdd8d32ead8db9e1b54d2d3d50e2815268fc1a6ec566981bc8ca2a4583f3d40e817433d0f4f25cfe6cc1897449ba5f26a9d66ac73e6f5c401376f23a314e0b9ff997d22f3e34b5524642c248aa813edaa626f0000000000000000000000000000000003ba5bac34b611569a451564d3a5400f9097ffe7a37e765bc652be71ee24250d6d9cf19878dd62c53062d6000c409de6a6135eae8a00000000008d797190a26c933f933aff5c521eeb7a84a62d148a846e74e76b515b6b8be29e8b69310fa130cf6d6b74f33205d3cc218ca554ed8085ae044f5bf2e89ad07963acbd4dd4dc5b4552591edde7a22ad06f7567e6fec2f65011b579bf609d61a3ff4d6f490824bb035995449fc34106ae6889f036d67b6aaee784f855ebc746ac871b5d2031ac0a252ac1f86e93e245f3793cea80b6de773899d49d11d3b1ed79163b111c976cf840a2ef6214a43338fba8c9edb6be26e68fcc5d47ed74a66ce8aba726ab955b9b32ab1890e84a5e2d7476252af25e5c95c5a8b2b1b5c8a2645b017d23c0f169d6ab529cc889bb07889d9e155114cf3e26a50c527ec6d4021cd2cacfea6d7e41e39e26b3967cad65c648b170f12ea9cc69dcee64be0c27b1f4f7f5ce3e62c35602c9d2921326891901661c85b9ee4a0a0b9636bef4c23788494f094abb91ed813b42828aa93105896e0aee851a8087e169a1d69e841257d9053d0cdc3a6ac4f12084cc6470abebe8b344b1f56690a2687b428686c854c21831da277e8b8a21b7b91a46d22ba083eca7b1f8268048cde7d6f237dca42035881b29ca9c8c2937971821b613894297ff6f7796053a4de1fd77e180cc22b205d43bb4a1b59962c1f605ea1b74587100e8d579f157cb45561c357f9976cec6a43388b3049a0d9c171ff6145266ba119d00000000001ef3794a930eb12f3a6215c510bf0bca70c127e9c70cc7bef921249a7f18a0034ce3264a9e96656b47233e2ed7c76520e649c3fd550bdafd77c5cd72b4446d3e157ddd97e7622a6891fb739acd3b2cdaf65ac78490f0641be6e8c6f55bf3d228786895ff5fd5970faacd8a5025aca0aa1931f477ba06aa60051298c8bf7f3b399194f98dc3f4e8513ad06da09dc393c1284515986b8c70ac69512f6c0c04f42edb3a097a11f2ab480e3e391abffae097752300576337c6dd24c4a98280684aa1fe8c7b43ee8bce05fe979b34da18cdb44dbb030b8009cd3b3b44fd8e7b534acd3f1839cb54817668ab446d3d47848429ea831a57f26c8b05dedddceb24483f8f998b05c3ddf85c3799c9000000000000000000000000001e57cf839eb3150d6a076fb7b86fae98dbb46014f483aecb4ec4f0877371bcae8912c78aff857c669760f0e55041563c5c3e8ee4a0eef885fd43fe34a1febc82370d1d07fdfe705ada4764320889000000000000000000000000000000a790af4fc17872b55b10db99e212d18193235659df45627da300959eafc8bfb44f70d250f8f2e86532700254c9a8b14999f59c8b9034c4bb2448eaeff5db21d4a7f3d974790d4c3cba7c402f50585b9289d86400679e5c2bcacb2841ca074d51fdb4a29e84d72b6c996cfbee06aa52cd632e82ba068e8e1572ef2eb414ba5fccfc3c03e64df6a9cc3936c604aa2c0e2ec7b777475023f29b146af003472ce146a5ff997ba53c51026c0096154f9280a34bbf21d66f57a250b5397766122fc86950ce5252e96868cd04df54764cf2082153d6cedd8aaf9700c734aa4a1cb33a2e0a13c5687be4de327511bff9816d13c3219dac1c1535f10243db6f96960ea6a621f5e1b7babbedf0a6bf0cf74123d2e78d01be2b048883a2459eec630fb0293d28d9799fd3a792caff693fd9f002f14c43fb5a1051cc686b7f114d7927eed559bdf2e8ddea3e61d5d942b63fe90230b2e1948fc563ef94d437281671d2fe5032d2a091fa842b0af2e116ba"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r8, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r9}, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)=ANY=[@ANYRES32=r7, @ANYRES32=r7, @ANYBLOB="1a00"/12, @ANYRES32=r9, @ANYRES64=0x0], 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000880)=ANY=[@ANYRES32=r4, @ANYRES32=r1, @ANYBLOB="810000002400000000000000f4c4cf1c959967af0676362cb276713511f4a445068f59eae3c85af2b1a854455ebfcde8c875e408132482cd47cbb9f98ae1470019ebdcc7fa4485de042358ce50faf188f8854beacbea6f718a19817d866cfe0e5f200c613d332780a8dc574e1bc78ca9ac42365b55c358dd9091cf21bbd59809287ff1dad0a09e3df488d780c485fcf68ba1a658af501ed358fcec3ef14587f89a176ba0defc81ff7f15c31ed00db517ee4dbc38e508e0598e43b5c104e279b4aab96b2fe7db15890dffcd51a3740fd490861e85b712b8453306a532f9ad93ab2f1687ed38b7090e58", @ANYRES32=r9, @ANYRES64=0x0], 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8983, &(0x7f0000000080)) r10 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/148, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff79}, 0x16) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r10, 0x0, 0x83, 0x0, &(0x7f0000000e40)="04d31fcd275bfc58188e699fa7c9aa904991771e83b702f3717cf38ed0e92e83ae490758991fa1174a75fa8c45db732026d3de611ffbd09b683e2f08812d695dd9b87f08711c02bb5d2cbac05022bee8aee5339fb6eba21e534e43b9960f470bf9c075368c6a7ee0b6ef641feb6967490ae07547819adcf47330679551ae2bd7009b31", 0x0, 0x947, 0x0, 0x1b, 0x4b, &(0x7f0000000000), &(0x7f0000000e00)="2fda8e7aa8d9cecae13bcbb35230d1cf1f1b23e33fcbd1aa1bea454b04650cecef80daa9a0a349a8e46d661af6e7ee8cdb5e97e738fe54"}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000200)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8000000}, 0x10}, 0x94) 24.044911826s ago: executing program 5 (id=8738): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x3e, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@decl_tag={0x1, 0x0, 0x0, 0x11, 0x1, 0x4}, @ptr={0x7, 0x0, 0x0, 0x2, 0x3}, @ptr={0x1, 0x0, 0x0, 0x2, 0x1}, @fwd={0xc}, @float={0xd, 0x0, 0x0, 0x10, 0x8}]}, {0x0, [0x0, 0x0, 0x30]}}, &(0x7f0000000780)=""/132, 0x5d, 0x84, 0x0, 0xfffffff7, 0x10000, @value=r0}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={0xffffffffffffffff, 0x20, &(0x7f0000000a00)={&(0x7f00000008c0)=""/207, 0xcf, 0x0, &(0x7f00000009c0)=""/17, 0x11}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x15, 0x29, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xffffffffffffffff}, @generic={0x6, 0xd, 0x9, 0xb, 0x1000}]}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xde, &(0x7f00000005c0)=""/222, 0x41100, 0x40, '\x00', 0x0, @fallback=0x1f, r2, 0x8, &(0x7f0000000880)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x4, &(0x7f0000000a80)=[r0], &(0x7f0000000ac0)=[{0x4, 0x2, 0xa, 0xc}, {0x4, 0x2, 0x5, 0x2}, {0x5, 0x3, 0xc, 0x2}, {0x2, 0x5, 0x4, 0x8}]}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r5, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$TUNGETFEATURES(r8, 0x5452, &(0x7f00000013c0)) write$cgroup_int(r8, &(0x7f0000000040)=0x4, 0x12) openat$cgroup_ro(r8, &(0x7f0000000d00)='memory.stat\x00', 0x0, 0x0) r9 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYRES8=r9], &(0x7f00000007c0)='syzkaller\x00'}, 0x94) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xb, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @volatile={0x9}, @var={0xd, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0x30, 0x30, 0x30, 0x5f, 0x30, 0x30, 0x2e, 0x2e, 0x2e]}}, &(0x7f0000000340)=""/27, 0x4b, 0x1b, 0x0, 0x67c, 0x10000}, 0x28) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x8, 0x18}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r10, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0], 0x0, 0xda, &(0x7f0000000700)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000740), &(0x7f0000000800), 0x8, 0xf5, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1e0000000008000006000000540d000000000300", @ANYRES32=r12, @ANYBLOB='\b\x00'/20, @ANYRES32=r13, @ANYRES32=r11, @ANYBLOB="0400000005000000010000000900"/28], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000c00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1, '\x00', r13, r8, 0x1, 0x0, 0x3}, 0x50) 23.911078159s ago: executing program 6 (id=8740): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r4}, 0x38) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open$cgroup(&(0x7f00000046c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x3, 0x0, 0xfc, 0x0, 0x8, 0x4261b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2000000}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40010) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r10}, 0x10) 8.661469613s ago: executing program 47 (id=8738): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x3e, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@decl_tag={0x1, 0x0, 0x0, 0x11, 0x1, 0x4}, @ptr={0x7, 0x0, 0x0, 0x2, 0x3}, @ptr={0x1, 0x0, 0x0, 0x2, 0x1}, @fwd={0xc}, @float={0xd, 0x0, 0x0, 0x10, 0x8}]}, {0x0, [0x0, 0x0, 0x30]}}, &(0x7f0000000780)=""/132, 0x5d, 0x84, 0x0, 0xfffffff7, 0x10000, @value=r0}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={0xffffffffffffffff, 0x20, &(0x7f0000000a00)={&(0x7f00000008c0)=""/207, 0xcf, 0x0, &(0x7f00000009c0)=""/17, 0x11}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x15, 0x29, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xffffffffffffffff}, @generic={0x6, 0xd, 0x9, 0xb, 0x1000}]}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xde, &(0x7f00000005c0)=""/222, 0x41100, 0x40, '\x00', 0x0, @fallback=0x1f, r2, 0x8, &(0x7f0000000880)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x4, &(0x7f0000000a80)=[r0], &(0x7f0000000ac0)=[{0x4, 0x2, 0xa, 0xc}, {0x4, 0x2, 0x5, 0x2}, {0x5, 0x3, 0xc, 0x2}, {0x2, 0x5, 0x4, 0x8}]}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r5, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$TUNGETFEATURES(r8, 0x5452, &(0x7f00000013c0)) write$cgroup_int(r8, &(0x7f0000000040)=0x4, 0x12) openat$cgroup_ro(r8, &(0x7f0000000d00)='memory.stat\x00', 0x0, 0x0) r9 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYRES8=r9], &(0x7f00000007c0)='syzkaller\x00'}, 0x94) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xb, [@typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @volatile={0x9}, @var={0xd, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0x30, 0x30, 0x30, 0x5f, 0x30, 0x30, 0x2e, 0x2e, 0x2e]}}, &(0x7f0000000340)=""/27, 0x4b, 0x1b, 0x0, 0x67c, 0x10000}, 0x28) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x8, 0x18}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r10, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0], 0x0, 0xda, &(0x7f0000000700)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000740), &(0x7f0000000800), 0x8, 0xf5, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1e0000000008000006000000540d000000000300", @ANYRES32=r12, @ANYBLOB='\b\x00'/20, @ANYRES32=r13, @ANYRES32=r11, @ANYBLOB="0400000005000000010000000900"/28], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000c00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1, '\x00', r13, r8, 0x1, 0x0, 0x3}, 0x50) 8.649154603s ago: executing program 48 (id=8740): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r4}, 0x38) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open$cgroup(&(0x7f00000046c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x3, 0x0, 0xfc, 0x0, 0x8, 0x4261b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2000000}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40010) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r10}, 0x10) 7.199417761s ago: executing program 8 (id=8758): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b3}, 0x0, 0x9, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), &(0x7f0000000580)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000800000004000000bb7f1ad04d00feff0000000095000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffd02}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="1800"/15], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000004000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) 3.760864148s ago: executing program 8 (id=8784): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1], 0x18}, 0x8810) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) close(r2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd0e, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x17, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0xec}, [@exit, @exit, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6368}, @initr0={0x18, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x6f8312e1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x5, 0x1, 0x0, 0xfffffffffffffffe, 0x10}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x58, &(0x7f0000000280)=""/88, 0x41100, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x5, 0x10001, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r3, r3, r3, r3, r3, r3, r3], 0x0, 0x10, 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000680)={r5, 0x0, 0xf7, 0x0, &(0x7f0000000800)="7f9ed6102f13eb43fd33cf6e26b6b600dcab7fc0cb8ea491f83a54e3f33ed5f095066b7b6927c253a9bcacfb7b2b13e34b9a67e5f7bb07b5dd496d6d791a8e1fe8af672e0f1e32baf8baab16cd52644dbd7694171aaed7935f46741cfa2837d1823b3cbf12ec02163a25f2b43d7b7aed3aa153cb743ae003097b398c4a0871052d10cda6c2023727f0ab5e654e903d712c0af341c276aff10215a126f1571477c4256b054fdc3ccba52457992f331c9a73f8d79b7059143a473b921230411d14dd117f5f82841ed14cc73bfedb42b1a6eb646bc2b839cbe3fb2b202b9a83c1bec4c7d9d6ee6c735d42a62203463d87a689e44b6756251e", 0x0, 0xfffffffe, 0x0, 0x59, 0x0, &(0x7f0000000580)="a9845b1824479cf217b0be94ab85490732537027f3846552ba9cdeba7515c7e99e6a7a8e91600ed9f28728c52f7efa21926b280f3b6fe0e7ff230e7e04b981c6d82775f70c9e9f412af49f1ea68f96afb44a0994c782261f27", 0x0, 0x2, 0x0, 0x723}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x18) 3.394411315s ago: executing program 0 (id=8789): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x18) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003440)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\a\x00\x00\x00\b\x00\x00\x00\b'], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xdba24f1ae7f3ded2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xdba24f1ae7f3ded2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x36, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x10, 0x8000020}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x36, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x10, 0x8000020}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a3, &(0x7f0000000080)) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 3.393412975s ago: executing program 8 (id=8790): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x54, 0x5, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x6, @perf_bp={0x0, 0x2}, 0x0, 0xc48, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101801, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'batadv0\x00', 0x1003}) ioctl$TUNSETDEBUG(r2, 0x400454c9, 0xffffffffffffffff) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x5, 0x6c, 0x2, 0x2, 0x8, 0x9, 0x0, 0x6, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x2000, 0xff, 0x9, 0x0, 0x4, 0x145d, 0x1, 0x0, 0x3f8, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000000)=0x1) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x98, 0x0, 0x0, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x93, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r5}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)=@o_path={&(0x7f0000000300)='./file0\x00', r4, 0x4000, r3}, 0x18) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000000010000000400ebff00000000000000800000000a9500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2.761971987s ago: executing program 0 (id=8795): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004020000080000d0f49153b946376100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000003000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r2, 0x0, 0x1}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r3}, &(0x7f0000000800), &(0x7f0000000840)=r4}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) (async) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xd, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000016c0)={{r7}, &(0x7f0000001580), &(0x7f00000015c0)}, 0x20) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x400000000000}, 0x0, 0x4, 0x0, 0x0, 0x504, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110c230000) (async) ioctl$TUNSETOFFLOAD(r8, 0x40047440, 0xf0ff1f00000000) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xf, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r9}, 0x10) (async) unlink(0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) 2.539315861s ago: executing program 0 (id=8797): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0xff58) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0xfffffead, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x40}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000086000001"], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000002e40)={0x0, 0x0, 0x0, 0x0, 0xf, r7}, 0x38) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r6, 0x0, 0x20000000}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000007000000000000000000000001050000000800000000000000010000850000000000000000020000000000000a00000000da"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x1}, 0x28) 2.484380592s ago: executing program 0 (id=8800): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r0}, 0x10) (async, rerun: 32) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) (async) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xd9, &(0x7f00000004c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000500), &(0x7f0000000580), 0x8, 0xe5, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, 0x0, 0x0, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x496, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00)=r5, 0x4) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4891, 0x0, @perf_bp={0x0, 0x7}, 0xc00, 0xc8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r9}, &(0x7f0000000380), &(0x7f00000003c0)=r10}, 0x20) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r11}, 0x10) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033200fc08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 2.413783814s ago: executing program 0 (id=8801): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000002800000f4000005", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000b800"/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000bc3a0000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1900000004000000040000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="994418b600"/28], 0x48) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000080)='syz1\x00', 0x1ff) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x1, 0x12) close(0xffffffffffffffff) sendmsg$inet(0xffffffffffffffff, 0x0, 0x40040) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0500000004000000040000000400000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000ffff0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b5af2717f8177bb30cb9e56498556dc6b489f66d6d70f49fc05e2ad6a34c205677f3480af5adcd27b0782643fb277cba3fc0264917bded244290af5cc63431fc17321c3357200813d853fb2dc37c44ffb92db79800", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000076000000bf0900000000000026090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$inet(r0, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.362294005s ago: executing program 0 (id=8803): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/12, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12144, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x1, 0x28}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x34000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0xfffffffe, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x90) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000001000)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000001040), 0x12) syz_clone(0xc0126080, 0x0, 0x0, &(0x7f0000002100), 0x0, 0x0) 2.202271138s ago: executing program 9 (id=8805): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r5}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r7, 0x0, 0x0) (async) write$cgroup_subtree(r7, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) sendmsg$inet(r1, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x48000) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) (async) close(r0) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r6, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x6a, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000740), 0x8, 0x41, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0xffffffffffffffff}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x1, &(0x7f00000002c0)=@raw=[@generic={0x3, 0x3, 0x8, 0x2, 0x7}], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x70, &(0x7f0000000340)=""/112, 0x41100, 0x0, '\x00', r9, @fallback=0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x4, 0x5, 0xfffffffe, 0x6}, 0x10, 0xffffffffffffffff, r2, 0x5, &(0x7f0000000a80)=[r10, r8], &(0x7f0000000ac0)=[{0x3, 0x1, 0x4, 0x9}, {0x0, 0x5, 0x7, 0x1}, {0x3, 0x3, 0xc, 0x3}, {0x3, 0x5, 0x3, 0x9}, {0x2, 0x4, 0xe, 0xa}], 0x10, 0xfff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r11}, 0x10) 1.837095715s ago: executing program 9 (id=8807): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 1.818068885s ago: executing program 7 (id=8809): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x63}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.732004657s ago: executing program 9 (id=8810): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{0x1, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)=r0}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={&(0x7f0000000100)="1d17d75cbdb9d199691e057c01833e785dd55a588c4c272dd0f1d21812ecd2054cbf75ae1a0206ab5e4f17a6e5d2f0f441eccde61536565295", &(0x7f0000000140)=""/46, &(0x7f0000000180)="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", &(0x7f0000000280)="9aaeea413b64578ea8e8bebe9b677563f24d52c997f2e399ff4ae65d610ee58ea21ab3cf9eb0c48a9a4db8f8c34b5c6613ef27a7cfe64e66e24fc6bc062d3efe2374f72f93c327adef8a2ca2cd7cf1533f35ce2901d0995f2af59db416418ebd1c974f7e0487dad1bbc60e1a9bf35100adff91aaa431d8272570b68b7c9f1e8d68f6267dac2a0682982c9779097e5bcca11163688dff7d9a94183f9432ec49611fef380d283806fa2e056c732e1db68f97727bacaf7f8266fe18bb11514fb9101c4b2b94", 0xc69b, r1}, 0x38) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22667f2c"], 0x280) 1.657661778s ago: executing program 7 (id=8811): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{}, 0x0, &(0x7f0000000840)='%pI4 \x00'}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0a0000000200000002000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000000000000000000000000000cc00", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r1, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000003, 0x8404, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x810c, 0x0, 0xc4b, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000200)=0xdd3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) sendmsg$tipc(r4, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18010000179fa10000000000ff000000850000006d00000018110000", @ANYRES32=r0], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) 895.729453ms ago: executing program 1 (id=8813): bpf$TOKEN_CREATE(0x24, &(0x7f0000000180), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0x5, 0x20c0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r4}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 810.321065ms ago: executing program 1 (id=8814): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100)=0xfffffffffffffffc, 0x12) ioctl$SIOCSIFHWADDR(r4, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x2, 0x80, 0xc2, 0xc}}) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x30, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r5}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_int(r4, &(0x7f00000002c0)='cpu.max.burst\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r7}, 0x10) 786.766315ms ago: executing program 7 (id=8815): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x4, [@datasec={0x2, 0x2, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x1}, {0x5, 0xb5, 0x9}], "25ff"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "b8b3"}]}, {0x0, [0x0, 0x5f]}}, &(0x7f00000004c0)=""/158, 0x50, 0x9e, 0x1}, 0x28) (async) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000380)={0x3, 0x80, 0x8, 0xc, 0x7a, 0x8, 0x0, 0x7fff, 0x10, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x10, 0x63f, 0x1, 0x7, 0x7ff, 0x2, 0x1ff, 0x0, 0x2}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x16004, 0x0, 0x81, 0x5, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="61106800000000006113740000000000bfa00000000000000700000008ffffffd503010017740040950000000000000069163a0000000000bf67000000000000350607000fff07201706000020190000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004d83dde4c375000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369226066812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20ceddf4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f6746a9709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c1d926a0f6a5480a55c22fe3a5ac00000000000000000000000500002000000000fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e14d90deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b06ff7f0000000000007f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a1f37302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089e0b1c23c0f3cdad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a1a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631d22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0af1cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4c6ea9604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c29984864961a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a09d8be0fc5beecf153236c19740be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000000000000000000000000000000000001386866b311bd144bc32e059658c9f8342c90c1ade31b78072841b8b5a943d62a44cea6b050c42e3c205fad6a23fb43c93da0f49d911877265e6ee443e37397ecf89021e7f579e8d3a74c12b52938d91e9de07fc8eeeb9505f4a9c26266bf5449484ccc1317c7476"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) (async) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r6, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x21, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x8a, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x2, 0x0, 0xffff, 0x0, 0xffffffffffffffff, 0x3, '\x00', r7}, 0x50) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580), 0x4) (async) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) r12 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d00)=@bpf_lsm={0x1d, 0xa, &(0x7f0000000ac0)=@raw=[@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xeca9}], &(0x7f0000000880)='syzkaller\x00', 0x4, 0x7f, &(0x7f0000000b40)=""/127, 0x41100, 0x41, '\x00', r7, 0x1b, r0, 0x8, &(0x7f0000000bc0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0x4, 0x4, 0x4}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000c40)=[r8], &(0x7f0000000c80)=[{0x0, 0x3, 0x2, 0x3}, {0x4, 0x3, 0x10, 0x7}, {0x0, 0x1, 0xf, 0xc}, {0x3, 0x1, 0x3}, {0x4, 0x5, 0x4, 0xc}, {0x3, 0x9, 0x7, 0x2}, {0x2, 0x4, 0xe, 0x1}], 0x10, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000dc0)={0x0, r12}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000740)=@raw=[@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x68000}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x7}, @jmp={0x5, 0x0, 0x1, 0x1, 0x0, 0xffffffffffffffe0, 0xfffffffffffffffc}], &(0x7f0000000780)='GPL\x00', 0x2, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, '\x00', r7, 0x1b, r9, 0x8, &(0x7f00000007c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x1, 0xc, 0x7, 0x1}, 0x10, 0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f0000000840)=[{0x5, 0x5, 0x8, 0x1}, {0x4, 0x5, 0x5, 0xb}], 0x10, 0x6}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r11, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="002010000018110000ffff0000", @ANYBLOB="83b40587b8a1188b955e9ff12bac41c2f35102127edab587d6764d249c0c7356d075d3636d7963cfff9383cc2a85764af2d41bcdeae87aebd9d39fefa4f923cae893cd1f3584b655674325168177094743c01c4dbbe07bf8ecc2d2bf3ef8bacb10743202e53b1e76ec4637a12057a69c690f9723bb3f1bdcf199d6776202d95b425e6198fc60c24d6952daea46ae32439f5afb59064977d3d0fdd8ccd37a0bb4e9dfb54bc53e5ef4fc16aad1ceb340bb70a7d7802301db73fa1593d7970545cb8a1301c5eaff144e1cf5f262d9b08580b474d1aba8904444d9645ce792b016e79eb638626410b65f76", @ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x13, 0x18, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_fd={0x18, 0x99ebf590fda2d14d, 0x1, 0x0, r3}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x2}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x3d, &(0x7f0000000400)=""/61, 0x41000, 0x0, '\x00', r7, @fallback=0x7, r9, 0x8, &(0x7f00000005c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0xe, 0x3, 0x1}, 0x10, r13, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000640)=[{0x3, 0x4, 0x3, 0x4}, {0x4, 0x1, 0x2}], 0x10, 0x1}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 774.009105ms ago: executing program 7 (id=8816): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async, rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r1}, 0x18) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) sendmsg$inet(r3, &(0x7f0000000980)={&(0x7f0000000600)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000700)="a6829ae36eb37ff256368a0df7f220dbbe53a1169918736ec3f314569a35dd55a31b2c0b8a83c3d8fea9c89d733986ae6671485217ac8047cbdbbbb9753346", 0x3f}, {&(0x7f0000000840)="5ce5d40068edabd78559e4e3a6a6227cd104c39bb397a63540f56f6b53ec8022a0bd2fcbc98e1071c7710e9317e3a89496b05675a1e0d70b4807c2357ae79d20d651eec44b7c167e1dc753f724b0f8af28cf23d0c4546223632e680910daa9de459bee6eb1a3b9de758f5e0b5e193e7afedde996e984d876866b24c6fc3cb86c923c02c04e7ad147673ea749f892eb623bd5b6e726a68a7d032902262eeb8099af4da4e38f58117e6f72eaf0f3564c61c3c6cae2d6d73d5b60f7e6bb93ff4df8", 0xc0}, {&(0x7f0000000740)}], 0x3, &(0x7f0000000900)=[@ip_retopts={{0x48, 0x0, 0x7, {[@timestamp_prespec={0x44, 0xc, 0xfa, 0x3, 0x3, [{@multicast2, 0x1}]}, @timestamp_addr={0x44, 0x1c, 0x7a, 0x1, 0x2, [{@broadcast}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x4}, {@loopback, 0x6}]}, @lsrr={0x83, 0xf, 0xda, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}], 0x48}, 0x20000040) (async) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000540)='rpcgss_svc_accept_upcall\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000040)=0x1) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async, rerun: 64) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xfffffffe, 0x9, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000740)) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r5}, 0x38) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) 705.108457ms ago: executing program 7 (id=8817): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r1, &(0x7f0000000040)="dc0a55959eeb78d37bf5e66dfac9b133f1a9123d7996305100f64661a58aba67f2213e7d40218ff3cd7793183428e70a48721ed64e2afd14d27c812aef06a5f107f7a7c1f7c47cc2febe22a79692127258a255655c7bdcb412c66769eac65da46c5947d023565fdd9e96053022ea191663e356ff4b3861ae64946300eb731727e1afccd56b29ec34155821cd38e62de1b734f092af86efce054c18b8ed599f2e209b27812b853ecd"}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000200)=[0x0], &(0x7f00000002c0)=[0x0], 0x0, 0x55, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x12, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0)=r4, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001f80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 684.765457ms ago: executing program 7 (id=8818): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@bloom_filter={0x1e, 0x8a3f, 0x3, 0x3, 0x2000, 0xffffffffffffffff, 0xc, '\x00', 0x0, r0, 0x3, 0x0, 0x3, 0x6}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004"], 0x48) socketpair(0x8, 0x2, 0x1ff, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006b113e000000000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xd1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa, &(0x7f0000000240)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, 0x0, 0x0, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x496, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00)=r5, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1a, 0x10, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xd01}, [@ringbuf_query, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x200}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000740)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0, &(0x7f00000007c0)=[{0x0, 0x5, 0xb, 0x6}, {0x4, 0x1, 0xe, 0x1}, {0x4, 0x3, 0xc, 0x2}], 0x10, 0x1}, 0x94) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000004c0)='f2fs_issue_reset_zone\x00', r9}, 0x18) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x12, 0x1b, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@map_fd={0x18, 0x7, 0x1, 0x0, r3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xf}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8bc0}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @generic={0x8, 0x3, 0x8, 0xb, 0x9}]}, &(0x7f0000000040)='syzkaller\x00', 0xd2ed, 0x51, &(0x7f0000000380)=""/81, 0x41100, 0x0, '\x00', r4, @fallback=0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x0, 0xc, 0x7fff}, 0x10, r5, r6, 0x4, 0x0, &(0x7f0000000900)=[{0x0, 0x1, 0xe, 0x3}, {0x5, 0x3, 0xa, 0x4}, {0x4, 0x2, 0xf, 0x3}, {0x0, 0x5, 0x6, 0xb}], 0x10, 0xb}, 0x94) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r12}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) 556.80212ms ago: executing program 9 (id=8819): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000002480)=ANY=[@ANYRESOCT=r4, @ANYRESHEX=r3, @ANYRES8=0x0, @ANYBLOB="6509e6d4e4828e4d793a9ef261476315ab0d2043d9d6ed51e4839640b189a72081d25fcab1bdb29d9a6ecb99b44e89ca5fe8219ca7a233a6f07e219aae2859d744ea98d309ca12c1af84db6d394ea21b71870ec28de17f297b02467e3240f7c18d8e1951f6675013d9efb57cf49251324aa12f264f43526ea80e3374e2dca79b51b68f81352a4c839204fc4820ddee6f3d89e7b2fec875fa81381bfc1fadb90529860b28e6af3e639a421b42483ea55506ec9cfa6dad82deddbac76830901db098fd8dde6ffa208076c527d86b23f756de10c504b2006156500df69696e47bf799e9cb8d02241da8afd523deed7dacd6aa46529d94e5dd51122246ff22c110bc9a73b05c5f610f601d2a3f1d1953089b51b5dd4e1c63c556af5671ac6f180a9493ad722f1cf3718f0dadf462f74cb8d43d59db82236636da1c79843da5559a3fa48d6e0867f05ebba8e9ed53811c1b663abeee3779f6d549665c17bd408ec461e7238cd1bb829efcd6890eb9087efde31f4fa9d4860d2b70677bf6da1ff9fefcc3a0099e7f87db9c6cfd04139168a14d49719a69f6e2223142db7791dab10cfdbbf252cd27268eee0467273aaefc4bf255121cfdf5eb48b633ba5083f5cb4be8157097a9150807eb400a43815bd2332bf88582c9fd2c3a52c70c47d255c2ed22607c431342cc9f7107614fd03e4e238a75f67320fe3f7f3b16097158a74d65bc42a2e97ddfaa0a4b753af7039463457fbf312b9b8e367e897c85301a8528e15fcf3c9fc6eb8219acaadd5072a8a6b567ba971575172f0e2ffbfe8427b7af166117d688f9b93a81e881cd994dba18e542bed48a848b176ab9b9ff8803242e9880702093d3ba08434e83054e7904a4a3706e076665a7a8d4827f6dcabf42b09e7fb67e195b9138abc6df3215aa28a8c45de5e53db140b22ecb1b8d97b23beb3fe638e245a43309a3d2b61e48b1df7ccc7e84c9b5e0afa65009f14ae65a7aa6bed8806f64126446ff21a5e937451647fe96894597e7ed6777b0f9747e265d036e85e28807b8f34aafcc56c45567b044312aab472e41dbb8c720a9225d6e7df8534c11811e5acf3da3197d324cba964ca36ca8de9d572a6288e7053da32793b114de7c4c109b96afb6f54fa45e9b3e7c7ebf70944052c64cd86ab9a174e757239e4e518625189a35d8be051edc71a56485c0a86a731ddf978c930ac7cdbb0ecad57fb66f30eae69b7887e4f91ca2562cc9ea354d6faf377f5ef3a5f5b2bd920f38371de03783581938e22f74d0c10cfb84dcd991013cc2c813c73f6470ba00c2e768eb54eda5a29f6ed6b508e018cf565179a52619be9a08530a2ecedc893fa4ddb4a1109b70624da32793ff04efd97889dd272a44ea1f90b6669d9bc3563f1444c13693e3166fc804e3adfe87108eff50b7f67df2fe9a157cf2a7ce552f18bd41ed1dfe1555686aa7cb88d15d0b6bc8eaa95e2d7e144617f3d7d4ceb64186e135b8dd4088b25f324ec9f149befff9c7dc0d64ff160ec7d0017e019676b45d2b9fde3bb3a7831f65bedfcb0971b3357aae1345c4a623581a70efc7777684bf0b20c76391e753c7e9e201ce01ca611f534a94b0e10bbf206524f40d1413a1ca378c9826d5135b32512c09d0f6685a634776f3cf33564eb3674933e0b39b8871225d9cb2618abb7743b19594d8b12ad3e605a63c76d978bc0c5828d53e0b044768d7c19a38fad4c6de57d60f7c48e02de3154cbb0876431936cf23955dbf479f77f83f5b4185d623ca569698b246ebff037129a6744424c99d941f7044b1c3fbcee588993b2125083ee83311f08035ace53bc6b6d2dec4fcb97498166e2cd8b229a16b19c340e35a453998c00c13cc898477befd7427751ad7e2483d706f1b03684cbf956bb70958779d584256fd26f88f554b256af5833ce68567022877eeab89c7bf94641f7560fb34ee2213310dd16278c9a500e812b550d0e83f71295e123432c7e1c17da16ed75a74986bb0511e48f7fc2d6728daa80abbe5aa45ddbf7d0196c779f44bf1848b264e52bd2541edf6e20506257e695203d6bb5d6294bff5a965bb156d60c01435943d21f2e0613010520d0f0ae8315425d1fcccc13adaef661b322cf38ccf5c5218ff97651fcc432453d1d15d7d489f379295fa086d47aee76c5c7d9419e6c338734928505d811a4c488aafb3fabc2e5b481601ed79c0da8a99ddd6514341119fe107981a5d05513c07c9955ead5f7311abd734836353e0cd46ae52e18b963e1fba9047c580fe1a531f423c8769511fd46a4527988616e33a7d72493bbf5deee3b10d395f34e3b7963326ed1378658d54d209bdd855b7ee061b55092db348440419c131fd712325ef4196c6f7cf457170555c0a0f1f0e7dbe2633afd4eb474066e987ef1bf912392b15dc8c1f18a40cf57bedc5c941e54c0dbd4597ee7846523505a4bd28c3b4133f3e169d202c81253829a1513594aa99bda978e223651a82802ea2f3341b9d226559ea6683423f37a586f8b233ed90eea0c005335b18f48b50cc266eab32402db38da8d2560dd6f31c6049873455a4e9f10ee2c2aa87c09a863258934acda6a3efd655e64d945d78e1c376655861fd7c497c620a1b34d12acaa844897b6f625652f6ec2296065433d23f2bd4f8887bcc00dcb97e5dad718f07077b35a7ce32fc1f00334428ffbb17627cc77c6538e70c59024ce92ef7d3abc7ec9316d1a5de3c66c519ca30a3ce1f274c5632a019748b71aed7017d0127bc0ec898b30835189ed2094c9da458272dc5cdecaf670aa49c00ebaa40ab95799f41e49d01f7d61347c4d763467f002e96221d4416e786d6e8460720d71ac19b5880adc20d0287b2f391b9d6e00bfd0d243e66d8e8d0f3999eb92cd2deb275c6cb5df3d8b5d874da87d1a6c72bb1c46bf8610c2989036b28e9926fa3153316210b8759823c689686b43cfe1dedaadbdbe66c82fe1acd25bd0cbe220349731df1af90e05adc8524a421d01a4dc08763d308bc60a24df6c21d4ac2af74813b7dc98da71c677b317aa2c8158a8c6c7819dccdd81e0969ae68a9bd96fdd7858869105bf86a14e1da6a8923132298ab978e6ae4579e2117792485ab821417fa55c6e1edd9b7931bb39e33c8aab4ea5f6bcf20fc2654f031391e19531b4553875d02460aded3074ce44ac23bcf27d9bdb81022cd724aa17656afc51a631ae091f9c74532afe44e42870aabc62adccd18a660330baddcb7d12d1104701ac469abcb523d730ec555f4e1e32dc5b495b8f2f65681bb474bb9a2f7bdc1e845173db5a4f817a0fd06ca514db77f6727a90cc442b43c5a3528abb7d0132f435eb5e14052c45e5c140e7532366a472365a988868bb254963589928eca161345e2d64da8d87cef24d5e3ce4e8037efd1d76b81cb8f1271e6edf0a49bd1d56393d7f84c36f439b462ff30b15437540b9893ebe3251ae5e2f11e6fd06d43d7e7d39f762db4df68b8348d9b289d87dc7bd8a26f36ae01aaf9b32c048c8ca32f6b33a46432480ddd5e2804a28997ff6c1b38534f8a7c861919a886a6506c84cc571b3d1c1007b48bbceaba0660731b35eb2bdf7ce41134c8e66c7f0617ef5bfb951c7401de4b19ce1c42d44690bf0745afd77a66610e03f3800341fa75bcfe867f2eb05ed564876ff6c29fe44db1790b0586c0a85dbdb5d28e39be421cb1d723a0c56e48802785de0dbd07f736ae3e8206c0fc3495ec3e60e99dc3edf64626cf09015038873bfb527eb28a0e3f6b02a59de5eca901ff6d44745030ff6cd2baa82182407b81b5e2b01df8406f2c0c31578aa091f5e5f712d01f20e5fe4a7f79f461cabb963556420c9472d1794b5692e7f9b8eeec37b517b37075952fe81e5fa4263e8717f0722cca37a1d09480bd0646f780be31d1ab62e9aa36460e0b37ffa829b1352bd512e6977412139b882ad70eef6b3ed5c7a7961f701388dc1dda98a1e16d3ff7773ad816b5c0241322ca8e8fc340d15f61491b3aca4396c477c9de2099cb1ccdeebf1049fe5fd749465a06c0c14e558a1c8e75aa3d680d415ba4603e2568a0a03a5784fa053e1e0d84a3bb83eacaa13c602787b9e9bb9abfc963bf43f3218566df613f7cd4f86218e1d7295395be96092a7e917d0ec5fd44b03728c48de3fc295fa6f884e57156fa50ba89390f492b4c3fc36a1e0b5221ec27fd1f619ae955733638bc712d342e5b3081eac117c674431dc00996a2c9fc6408156ca62ddb8e3c950f3107d74659647e68564f75fea909e27f849db12592743051936ad9cf790b67c5e4164caa67f862428c0b41bc9d1950f0f8c8899381e308cb02bfe18fe26b89a70f4f54fdafb079a4b6137983dd76a678e5d2cae2c5b19fc6f9fac368a404a86e277962cee51f5c7735f958ed1ba74975d82af2840627b6cb265edbff6b6592d1193194f76e6db477d94b6a05e585b26f1f6b67844535fce09f51a05fcc808879f5a4fbbd012a7ed0a96f1a6d87e674e354c07f16f2d8d5e05da981461c6b6db2ee873fadaa4af529422d4a4e8c59e7157887bea3b473ac28de29fe7e91ac74c5a277dc124a579a657f2622971dea5f7498a60ef02125a15750f3c267fffb7e191387482dd73ccf0aba0a8b1985903c0254a5570845c636381077d1b5792bbec430a296f294be8062a91e0a6bc45e027a96043631a8b278dc37eed6fc53d27092fc8c3b5a0dcd3a9bb3fb77d07b1920a15a80c4e92d97cfd849dd51009acee9d3431c739a77466fa60cf17b819a76af0a58d1b0a9ddf1575b205eab8e18f0ba2f0d4d3d06208e528dda16c91ad5320d28f18a451dd38c474c18bab9a9fd5dc08a85d52c8c9867ff8a6f629271be2dc9a3b3bfe7918179f35df1423b373b76a6852c521f565f3932dca11ff7d6d039f9e25d2bf04cef05ee55686896ebeec6b16b107dc5ddb0391667acc8f4a0bbf1d3fc7e8b3376d213bb5aa97347a7fdfd4c9ff06d9e710903fccbaae5b15970297a1097214c46718873f8cf48ed8743e43634863917ae029680c07220c0fd02b9ef29e33bf4b8debbbba0c443085fdefb97bfebc438658cd933629e4fb54a40719279299f5637bf15e2a641e0d7060c102951a832c61e4dab002528bfdbfb0a7d4d6d71f542050ea7980311e5c0f48c013c9420a47c17a24034e467611b48a769e1b2f796e0beea2959554cbca5ab855ed91c774688f4cd4c31fe60923e9620a3d6a55c4fb7f23d382df98432cb3675669bf11d168ecdb1ddf02957492f56de84ec7eaf1fd7267e1505593a7d1e623c630b1314f2235ebaa47cc8a1d26d7b70a035d0d777020b12ac19b5b94c27c020446ac8a17a4934a150e464cac3e1cf8e71e0a05f70839149dee45a742c2bcec4dedc6997d7cff69166b2b625199679e12afaafbb45dccb21aebf5ee9719f51a9777e91a0bf4e3e1079213bc7e6db254a3e6f2f65f9b45a8b2e30845560b7b446bf8ba50171cc2e748f209db1ccfa5d9648127df6003a0ce484e4119dfa755526c8417e0f07e7d6c48f0942221b5185528f7cd29857d524c91a1c6cd23e5e6f1a17fcde3e32f1ee8b24c40c51c48c20c4a500349d3c30b58b9d257adcb293d964097719c2cfea2e39acde39eaffb365ac2571f4c2cdbf6cbf0939108802d8484798b4f9cbec25f7b4d0a2df6f0397f395498cfc9e590ff7eb02f195835b7c6ad8302bbba504049a72123789184bbde6edeae81e88880ccbad95aed5a605fb1c4634f60df37fc7e2ca7cba85796c03fc08bec039958724befc80bc1a1ebb0485409396", @ANYRESHEX=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x23, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000"], 0x48) (async) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r7) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000500000000000000", @ANYRES32=0x1, @ANYBLOB="0000000004", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 32) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r10}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r12, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r11, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r13, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 350.788914ms ago: executing program 1 (id=8820): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000140)={r0, 0x0, 0x1c, 0x0, &(0x7f0000000040)="abf9ebac4ab64e3be361469dd9434639f4f03649e15c2b403115cbd6", 0x0, 0x1, 0x0, 0x8f, 0x0, &(0x7f0000000080)="0235a6dd38b8e1da4cf431a9da4a7b22d84b38e035c7549eec573ef62a99165be20ff2639c146f91a5709abb1c374cabc599a0d9f1527313950949b25151a1500ff8d3ac3348161662d9b05171e78ef412a517ef32c80f81346406954813d0a714df080aac971d1e10bae2339a0a6728c79fc2adde0e25a796800babdd890d03f8f7d9f4c1b51def97fe877df8fe61", 0x0, 0x2, 0x0, 0x77d}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2a, &(0x7f00000005c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x11, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1ff}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x51}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x4}, @generic={0xff, 0x1, 0xa, 0xe, 0xdf}, @generic={0xa, 0x3, 0x5, 0x51d6, 0x8}]}, &(0x7f0000000880)='syzkaller\x00', 0xf0d, 0x4f, &(0x7f00000008c0)=""/79, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000940)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xf, 0x101, 0xb18}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[r0], &(0x7f0000000a00)=[{0x3, 0x1, 0xe, 0xc}, {0x0, 0x2, 0x4, 0x1}, {0x4, 0x4, 0xe, 0x1}], 0x10, 0x9}, 0x94) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x6, 0x0, r0, 0x0, '\x00', 0x0, r0, 0x0, 0x74e3, 0x3}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x12, 0x14, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x200}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @printk={@x}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @generic={0x9b, 0x8, 0x3, 0x4, 0x1ff}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @ldst={0x3, 0x3, 0x2, 0xb, 0xd16a952197c51186, 0xfffffffffffffffc, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f00000002c0)='GPL\x00', 0x7ff, 0xb5, &(0x7f0000000300)=""/181, 0x40f00, 0x4, '\x00', r1, @fallback=0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0xc, 0xfffffffd, 0xf}, 0x10, r3, r4, 0x7, &(0x7f0000000b80)=[r0, r0, r0, r0, r5], &(0x7f0000000bc0)=[{0x0, 0x1, 0xd, 0xb}, {0x2, 0x1, 0xe, 0x5}, {0x3, 0x4, 0xf, 0x9}, {0x1, 0x1, 0x7, 0x8}, {0x4, 0x3, 0x2, 0x6}, {0x1, 0x4, 0x1, 0x4}, {0x4, 0x4, 0x0, 0x7}]}, 0x94) openat$cgroup_type(r0, &(0x7f0000000d00), 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000d40)={[{0x2b, 'net_cls'}, {0x2b, 'perf_event'}, {0x2d, 'perf_event'}, {0x2d, 'blkio'}, {0x2d, 'cpuset'}, {0x2d, 'rlimit'}, {0x2d, 'io'}]}, 0x3c) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000e00)={{r0, 0xffffffffffffffff}, &(0x7f0000000d80), &(0x7f0000000dc0)='%ps \x00'}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000e40)={0x1b, 0x0, 0x0, 0x6, 0x0, r7, 0xe6e, '\x00', r1, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x50) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000ec0)) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000f00)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0xc, '\x00', r2, r0, 0x5, 0x5, 0x2}, 0x50) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000fc0)=@generic={&(0x7f0000000f80)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001040)={&(0x7f0000001000)='xen_mmu_set_pud\x00', r6, 0x0, 0x4}, 0x18) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000010c0)=@o_path={&(0x7f0000001080)='./file0\x00', r4, 0x4000, r6}, 0x18) r10 = getpid() perf_event_open(&(0x7f0000001100)={0x2, 0x80, 0x1, 0x6, 0x7, 0x8, 0x0, 0x6, 0x28283, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0xfffffffffffffffa, 0x7}, 0x101000, 0x9, 0x800, 0x0, 0x2, 0x839, 0x4, 0x0, 0xfffffff8, 0x0, 0x10001}, r10, 0x8, r0, 0x1) openat$cgroup_subtree(r0, &(0x7f0000001180), 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001340)={r7, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x1b, 0x10, &(0x7f00000011c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0xd}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}]}, &(0x7f0000001240)='GPL\x00', 0x7, 0x56, &(0x7f0000001280)=""/86, 0x40f00, 0x10, '\x00', r2, @fallback, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001300)={0x3, 0x5, 0x7, 0x800}, 0x10, r3, r0, 0x3, &(0x7f0000001380)=[r8, r11, r5], &(0x7f00000013c0)=[{0x4, 0x4, 0x10, 0x8}, {0x4, 0x5, 0x8, 0x1}, {0x5, 0x1, 0x0, 0x2}], 0x10, 0x2986}, 0x94) syz_open_procfs$namespace(r10, &(0x7f00000014c0)='ns/time_for_children\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000001540)='afs_io_error\x00', r6, 0x0, 0x1}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000016c0)={@map=r8, 0xd, 0x0, 0x4, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000001600)=[0x0], &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0]}, 0x40) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000001700)={'pimreg1\x00', @local}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001740)={0x2, 0x4, 0x8, 0x1, 0x80, r11, 0x1f8f78d9, '\x00', 0x0, r0, 0x0, 0x3, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a80)={r5, 0x58, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x3, 0x20, &(0x7f00000017c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @generic={0x1, 0x9, 0x6, 0x8001, 0x7b34}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x800}, @generic={0x3, 0xe, 0x9, 0xbe, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000018c0)='GPL\x00', 0x4, 0xc6, &(0x7f0000001900)=""/198, 0x40f00, 0x21, '\x00', r12, @fallback=0x6, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r9, 0x8, &(0x7f0000001ac0)=[r5, r0, r0], &(0x7f0000001b00)=[{0x3, 0x1, 0x5, 0x5}, {0x0, 0x1, 0x6, 0x7}, {0x0, 0x3, 0xb, 0x2}, {0x0, 0x4, 0x3, 0x8}, {0x5, 0x5, 0x5, 0x3}, {0x5, 0x4, 0x1, 0x5}, {0x5, 0x5, 0x3, 0x2}, {0x1, 0x5, 0xd, 0x5}], 0x10, 0x4}, 0x94) 278.544575ms ago: executing program 1 (id=8821): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="000000b7080000080000007b8af8ff00a6d527000000bf910000000059c4d233a95eae3429ffef2d1fb0b7cc00000000000085000000010000000000000000001f6c95d0c92d048a0225300e60d81bdcfbfdf7a3be105101097cbaf3a9a7c49a051d7e32ef18c06274e9488848b1a7c9839b1e1de519a0ae4b5786a588d6f35efdff7ba4f1bb8c088ce26a11ed3c5c76bb9d7ce1dd36cd"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r3, 0x0, 0x1}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000071122800000000009500000000000000eef513d3a8d744251af6fcfa9ac792223fc6"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x80) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000840), 0x4) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(0x0, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) 249.898505ms ago: executing program 9 (id=8822): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'macsec0\x00', @random="010000201000"}) 190.480987ms ago: executing program 8 (id=8823): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xe, 0x7, 0xc9d7, 0x9, 0x200}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0xd, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 189.891887ms ago: executing program 1 (id=8824): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x63, 0x11, 0x8}, [@ldst={0x5}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x21) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r2}, 0x10) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r3, &(0x7f0000000200)=ANY=[], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1fffffff}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x100000000}, 0x10, 0xc8, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000000500000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="9fedcb7968ddc36c8f263408008daa"], 0xfdef) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 182.306157ms ago: executing program 8 (id=8825): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='mm_page_alloc\x00'}, 0x10) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, 0x0, 0x0) (async) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) (async) sendmsg$inet(r1, &(0x7f0000001d80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)}, 0x48000) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) close(r0) (async, rerun: 32) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000001e40)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000580)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0xc}, 0x48) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) (rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRESDEC=r3, @ANYRES16=r1, @ANYRES32=0x0, @ANYRES32=r3], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)='%pB \x00'}, 0x20) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xa, 0x6, 0xdd, 0xa, 0x1, 0xffffffffffffffff, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) (async) openat$cgroup_ro(r6, &(0x7f00000002c0)='cgroup.kill\x00', 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYRES64=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)}, 0x2020) close(r8) 140.720677ms ago: executing program 8 (id=8826): bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x6, [@volatile={0x1, 0x0, 0x0, 0x9, 0x1}, @fwd={0xb}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5, 0x8}}]}, {0x0, [0x61, 0x0, 0x0, 0xee0240a06fa65aff]}}, &(0x7f0000001080)=""/4096, 0x4e, 0x1000, 0x0, 0x1}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r1, 0x20, &(0x7f0000000540)={&(0x7f0000000340)=""/238, 0xee, 0x0, &(0x7f00000004c0)=""/76, 0x4c}}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=@base={0x10, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfe3a) 1.38319ms ago: executing program 1 (id=8827): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000001400)=ANY=[@ANYBLOB="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"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0xfffffffffffffe14, &(0x7f0000014000)=""/4081, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x3a, 0x0, &(0x7f00000000c0)="e460cdfbef2408002900119386dd6a00000000072feb3014cd3ec8a774c1e1380081ffad000400e8d50000000100000bb500000500242c108906", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) close(0x3) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRESDEC=0x0, @ANYBLOB="aa18c6c4ddad000000000000000000800000000000000000000000005a93a6e9612d7829d324f97a7ddd7140f447bce5807b7a9626e54c857784", @ANYBLOB="badb7444eca47a2756d97d244903809a468020abfe5c109d7653e106adbbfa753343776eee9fc573d5da681cf282f479f3a92bed3c1dfe982553cd5c189af71dda4798554d3204dc580133237e15bc32cf182a3b364f"], 0x50) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) (rerun: 32) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fefd000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x0, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000030000020e74f5c4e4b52cb71361c1b5df141e6ce4f79930e10882dd44cf9f81980a6b279c1cebc6f25ee14115f1c1bc2d2eafd3fa341bb98bb54f876152bb9f8804d55a87074674add30cb9e3d1b757ef15b7dd756ccac710206ab9dd56527b3d0f8aa6187e85d653e18d59b171f772dde83527217a40000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0x1}, 0x48) (rerun: 64) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x24, 0x4, 0x9, 0x0, r6}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r7, &(0x7f0000000240), &(0x7f0000000540)=""/32}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000200)=0x1, 0x12) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000700)={0x7, 0x80, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa0a40, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) (async) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) write$cgroup_int(r11, &(0x7f00000000c0), 0x12) 0s ago: executing program 9 (id=8828): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x20000001) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000200)=0xffffffffffffffff, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000240)=r3, 0x4) close(r1) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.131' (ED25519) to the list of known hosts. [ 20.056094][ T24] audit: type=1400 audit(1758238802.390:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.057098][ T267] cgroup: Unknown subsys name 'net' [ 20.079033][ T24] audit: type=1400 audit(1758238802.390:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.107129][ T24] audit: type=1400 audit(1758238802.420:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.107299][ T267] cgroup: Unknown subsys name 'devices' [ 20.314967][ T267] cgroup: Unknown subsys name 'hugetlb' [ 20.320623][ T267] cgroup: Unknown subsys name 'rlimit' [ 20.517115][ T24] audit: type=1400 audit(1758238802.850:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.540944][ T24] audit: type=1400 audit(1758238802.850:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.566205][ T24] audit: type=1400 audit(1758238802.850:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.569916][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.598915][ T24] audit: type=1400 audit(1758238802.930:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.624825][ T24] audit: type=1400 audit(1758238802.930:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.651601][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.651622][ T24] audit: type=1400 audit(1758238802.970:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.686636][ T24] audit: type=1400 audit(1758238802.970:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.263580][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.270666][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.278349][ T275] device bridge_slave_0 entered promiscuous mode [ 21.286023][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.293389][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.300925][ T275] device bridge_slave_1 entered promiscuous mode [ 21.343977][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.351381][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.358853][ T276] device bridge_slave_0 entered promiscuous mode [ 21.366916][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.374227][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.381743][ T276] device bridge_slave_1 entered promiscuous mode [ 21.432996][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.440474][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.448146][ T278] device bridge_slave_0 entered promiscuous mode [ 21.456317][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.463616][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.471120][ T278] device bridge_slave_1 entered promiscuous mode [ 21.530547][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.537740][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.545432][ T277] device bridge_slave_0 entered promiscuous mode [ 21.552439][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.559708][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.567225][ T277] device bridge_slave_1 entered promiscuous mode [ 21.597709][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.604833][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.612114][ T279] device bridge_slave_0 entered promiscuous mode [ 21.621165][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.629127][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.637326][ T279] device bridge_slave_1 entered promiscuous mode [ 21.702606][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.709973][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.717441][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.724561][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.739201][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.746269][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.753845][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.760973][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.769208][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.776374][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.784012][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.791200][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.803119][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.810217][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.817936][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.825447][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.857226][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.864924][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.872161][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.880042][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.887536][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.895294][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.902659][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.910425][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.917642][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.941504][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.949987][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.957512][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.965412][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.973701][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.980806][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.017595][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.025742][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.034657][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.042960][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.050981][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.058770][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.067096][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.074408][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.082148][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.091070][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.099275][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.106835][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.115452][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.122657][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.130670][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.139187][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.146598][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.154402][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.162687][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.169997][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.177634][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.185977][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.194261][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.201964][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.210345][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.235187][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.243537][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.251607][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.260763][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.269389][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.277859][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.285931][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.293517][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.301233][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.309931][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.318228][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.325582][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.348261][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.356664][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.365163][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.373941][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.382044][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.391189][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.399613][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.408452][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.417079][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.424734][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.432484][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.440755][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.449086][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.456858][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.470275][ T275] device veth0_vlan entered promiscuous mode [ 22.479387][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.487815][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.498842][ T277] device veth0_vlan entered promiscuous mode [ 22.513166][ T278] device veth0_vlan entered promiscuous mode [ 22.521143][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.529356][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.537948][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.546657][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.555373][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.564055][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.572528][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.581959][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.590349][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.598958][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.607301][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.615460][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.623077][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.630729][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.648725][ T279] device veth0_vlan entered promiscuous mode [ 22.656510][ T275] device veth1_macvtap entered promiscuous mode [ 22.664640][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.673114][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.681446][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.689602][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.698144][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.707056][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.715476][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.724059][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.732214][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.747053][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.755459][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.763809][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.772053][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.783238][ T278] device veth1_macvtap entered promiscuous mode [ 22.791974][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.800046][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.808592][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.820441][ T277] device veth1_macvtap entered promiscuous mode [ 22.831885][ T276] device veth0_vlan entered promiscuous mode [ 22.839336][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.849903][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.858690][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.867634][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.875985][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.884255][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.891751][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.904723][ T279] device veth1_macvtap entered promiscuous mode [ 22.914499][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.923642][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.932123][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.940740][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.962017][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.970792][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.971109][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 22.980242][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.995552][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.004424][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.012733][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.021669][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.030023][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.045205][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.064771][ T276] device veth1_macvtap entered promiscuous mode [ 23.071592][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.086330][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.095278][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.130456][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.156487][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.166521][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.175997][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.215776][ T316] device syzkaller0 entered promiscuous mode [ 23.313273][ C0] hrtimer: interrupt took 26200 ns [ 24.708004][ T376] џџџџџџ: renamed from vlan1 [ 24.830147][ T388] device veth1_macvtap left promiscuous mode [ 24.878652][ T388] device veth1_macvtap entered promiscuous mode [ 24.903684][ T388] device macsec0 entered promiscuous mode [ 25.180705][ T24] kauditd_printk_skb: 39 callbacks suppressed [ 25.180716][ T24] audit: type=1400 audit(1758238807.510:113): avc: denied { create } for pid=429 comm="syz.2.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 25.209590][ T24] audit: type=1400 audit(1758238807.540:114): avc: denied { append } for pid=427 comm="syz.1.37" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.237981][ T24] audit: type=1400 audit(1758238807.560:115): avc: denied { write } for pid=425 comm="syz.0.36" name="cgroup.subtree_control" dev="cgroup2" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 25.272702][ T24] audit: type=1400 audit(1758238807.560:116): avc: denied { open } for pid=425 comm="syz.0.36" path="" dev="cgroup2" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 25.296126][ T24] audit: type=1400 audit(1758238807.600:117): avc: denied { write } for pid=427 comm="syz.1.37" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.356479][ T430] device veth1_macvtap left promiscuous mode [ 25.362581][ T430] device macsec0 entered promiscuous mode [ 25.375636][ T432] device veth1_macvtap entered promiscuous mode [ 25.528088][ T24] audit: type=1400 audit(1758238807.860:118): avc: denied { relabelfrom } for pid=440 comm="syz.2.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.549406][ T24] audit: type=1400 audit(1758238807.860:119): avc: denied { relabelto } for pid=440 comm="syz.2.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.695226][ T24] audit: type=1400 audit(1758238808.030:120): avc: denied { create } for pid=453 comm="syz.4.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 25.737508][ T24] audit: type=1400 audit(1758238808.070:121): avc: denied { read } for pid=462 comm="syz.4.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 25.759477][ T461] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.770418][ T461] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.840884][ T465] device bridge_slave_1 left promiscuous mode [ 25.853020][ T465] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.864365][ T465] device bridge_slave_0 left promiscuous mode [ 25.871184][ T465] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.094502][ T471] device sit0 entered promiscuous mode [ 26.146301][ T479] cgroup: syz.1.53 (479) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 26.162789][ T479] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 26.284274][ T483] syz.1.55[483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.284331][ T483] syz.1.55[483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.407749][ T24] audit: type=1400 audit(1758238808.740:122): avc: denied { create } for pid=506 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.795755][ T577] syz.3.78[577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.795811][ T577] syz.3.78[577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.067101][ T602] џџџџџџ: renamed from vlan1 [ 27.134221][ T622] device wg2 entered promiscuous mode [ 27.530704][ T650] device syzkaller0 entered promiscuous mode [ 28.577066][ T708] syz.3.116[708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.577118][ T708] syz.3.116[708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.715676][ T698] device syzkaller0 entered promiscuous mode [ 29.069167][ T725] Б: renamed from pim6reg1 [ 29.254431][ T741] syz.0.127[741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.254492][ T741] syz.0.127[741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.276605][ T742] syz.0.127[742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.302465][ T742] syz.0.127[742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.328656][ T24] kauditd_printk_skb: 9 callbacks suppressed [ 30.328666][ T24] audit: type=1400 audit(1758238812.660:132): avc: denied { create } for pid=784 comm="syz.1.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 30.912758][ T816] device pim6reg1 entered promiscuous mode [ 30.960310][ T820] device pim6reg1 entered promiscuous mode [ 31.265262][ T24] audit: type=1400 audit(1758238813.600:133): avc: denied { create } for pid=829 comm="syz.3.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 31.377243][ T833] device pim6reg1 entered promiscuous mode [ 31.545498][ T24] audit: type=1400 audit(1758238813.880:134): avc: denied { create } for pid=841 comm="syz.4.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 32.540111][ T890] device pim6reg1 entered promiscuous mode [ 32.752275][ T899] device syzkaller0 entered promiscuous mode [ 33.165820][ T24] audit: type=1400 audit(1758238815.500:135): avc: denied { read } for pid=913 comm="syz.3.177" name="cgroup.subtree_control" dev="cgroup2" ino=279 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 33.253077][ T932] device syzkaller0 entered promiscuous mode [ 34.317820][ T960] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 34.328270][ T960] device syzkaller0 entered promiscuous mode [ 34.431270][ T24] audit: type=1400 audit(1758238816.760:136): avc: denied { tracepoint } for pid=966 comm="syz.3.191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.484200][ T973] syz.2.194[973] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.484257][ T973] syz.2.194[973] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.741519][ T980] device wg2 entered promiscuous mode [ 34.821879][ T24] audit: type=1400 audit(1758238817.150:137): avc: denied { create } for pid=992 comm="syz.1.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 35.034920][ T24] audit: type=1400 audit(1758238817.370:138): avc: denied { ioctl } for pid=1011 comm="syz.4.203" path="" dev="cgroup2" ino=267 ioctlcmd=0x582b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 35.322895][ T1034] device sit0 left promiscuous mode [ 35.426525][ T1039] device sit0 entered promiscuous mode [ 35.540567][ T24] audit: type=1400 audit(1758238817.870:139): avc: denied { create } for pid=1033 comm="syz.1.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 35.757238][ T1059] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 35.787410][ T1059] device pim6reg1 entered promiscuous mode [ 35.831236][ T1068] tap0: tun_chr_ioctl cmd 1074812118 [ 36.318324][ T1109] syz.4.231 uses obsolete (PF_INET,SOCK_PACKET) [ 36.420978][ T24] audit: type=1400 audit(1758238818.750:140): avc: denied { create } for pid=1107 comm="syz.4.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 36.624270][ T1122] syz.1.233 (1122) used obsolete PPPIOCDETACH ioctl [ 37.204177][ T1190] syz.3.255[1190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.204260][ T1190] syz.3.255[1190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.482187][ T24] audit: type=1400 audit(1758238819.760:141): avc: denied { create } for pid=1204 comm="syz.1.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.510079][ T1255] device syzkaller0 entered promiscuous mode [ 38.937127][ T1301] device sit0 entered promiscuous mode [ 39.138327][ T1322] device veth1_macvtap left promiscuous mode [ 39.145346][ T1322] device macsec0 left promiscuous mode [ 47.240886][ T1371] device pim6reg1 entered promiscuous mode [ 47.380183][ T1388] device syzkaller0 entered promiscuous mode [ 47.719638][ T24] audit: type=1400 audit(1758238830.050:142): avc: denied { create } for pid=1413 comm="syz.2.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 47.897070][ T1440] device wg2 left promiscuous mode [ 47.905883][ T1441] device wg2 entered promiscuous mode [ 48.010934][ T24] audit: type=1400 audit(1758238830.340:143): avc: denied { ioctl } for pid=1458 comm="syz.4.329" path="socket:[19516]" dev="sockfs" ino=19516 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 48.086038][ T1472] syz.3.331[1472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.086096][ T1472] syz.3.331[1472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.174604][ T1472] syz.3.331[1472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.253589][ T1472] syz.3.331[1472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.527566][ T1487] device pim6reg1 entered promiscuous mode [ 48.716402][ T1521] device veth0_vlan left promiscuous mode [ 48.727160][ T1521] device veth0_vlan entered promiscuous mode [ 48.751762][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.762561][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.770554][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 48.876083][ T1531] device sit0 entered promiscuous mode [ 74.146826][ T1582] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.154146][ T1582] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.161601][ T1582] device bridge_slave_0 entered promiscuous mode [ 74.168835][ T1582] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.176173][ T1582] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.183705][ T1582] device bridge_slave_1 entered promiscuous mode [ 74.191681][ T1581] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.198942][ T1581] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.206393][ T1581] device bridge_slave_0 entered promiscuous mode [ 74.214309][ T1581] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.221343][ T1581] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.228791][ T1581] device bridge_slave_1 entered promiscuous mode [ 74.257989][ T1580] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.265220][ T1580] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.272622][ T1580] device bridge_slave_0 entered promiscuous mode [ 74.288452][ T1580] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.295664][ T1580] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.303622][ T1580] device bridge_slave_1 entered promiscuous mode [ 74.372112][ T1583] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.379606][ T1583] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.387075][ T1583] device bridge_slave_0 entered promiscuous mode [ 74.404623][ T1579] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.411677][ T1579] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.419492][ T1579] device bridge_slave_0 entered promiscuous mode [ 74.428760][ T1579] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.435873][ T1579] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.443159][ T1579] device bridge_slave_1 entered promiscuous mode [ 74.463847][ T1583] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.470971][ T1583] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.478728][ T1583] device bridge_slave_1 entered promiscuous mode [ 74.494935][ T24] audit: type=1400 audit(1758238856.830:144): avc: denied { write } for pid=1580 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.518922][ T24] audit: type=1400 audit(1758238856.830:145): avc: denied { read } for pid=1580 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.567014][ T1582] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.574091][ T1582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.581384][ T1582] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.588509][ T1582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.605980][ T1580] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.613569][ T1580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.620999][ T1580] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.628221][ T1580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.651213][ T1581] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.658275][ T1581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.665719][ T1581] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.672746][ T1581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.699285][ T1579] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.706523][ T1579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.714221][ T1579] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.721436][ T1579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.754848][ T1583] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.762106][ T1583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.769556][ T1583] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.776763][ T1583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.789264][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.796541][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.804795][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.812115][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.819758][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.827079][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.834803][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.842437][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.851449][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.859021][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.866406][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.905298][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.912816][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.921826][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.931767][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.939345][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.947515][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.955683][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.963147][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.970699][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.979253][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.986465][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.993995][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.002193][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.009379][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.016972][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.025430][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.032704][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.040301][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.048459][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.055817][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.063520][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.073438][ T112] device bridge_slave_1 left promiscuous mode [ 75.079655][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.087340][ T112] device bridge_slave_0 left promiscuous mode [ 75.093671][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.101301][ T112] device veth1_macvtap left promiscuous mode [ 75.212496][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 75.220921][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.229568][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 75.238827][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.247042][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 75.255581][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.263795][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.271313][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.279176][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 75.287344][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.310982][ T1581] device veth0_vlan entered promiscuous mode [ 75.318528][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.327239][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.335631][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.343024][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.350744][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.359953][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.368560][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.375773][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.383753][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.391252][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.399065][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 75.407742][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 75.416693][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.426397][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.434775][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.442394][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.450158][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.458592][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.466770][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.473817][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.481386][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 75.489578][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.499961][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.507537][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.524699][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 75.533530][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.541844][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 75.550570][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 75.569139][ T1581] device veth1_macvtap entered promiscuous mode [ 75.578894][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 75.588009][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.596694][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.604858][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 75.613153][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 75.621776][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 75.630164][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 75.638124][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.646183][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.654124][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.662282][ T1580] device veth0_vlan entered promiscuous mode [ 75.687437][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.696442][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 75.705776][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 75.714980][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.723117][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 75.731520][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 75.740398][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 75.748452][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.756527][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.764229][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.778623][ T1579] device veth0_vlan entered promiscuous mode [ 75.787568][ T1580] device veth1_macvtap entered promiscuous mode [ 75.797339][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 75.805690][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.814499][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.821882][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.829957][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 75.838604][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 75.846912][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 75.857627][ T1582] device veth0_vlan entered promiscuous mode [ 75.867095][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 75.882066][ T1579] device veth1_macvtap entered promiscuous mode [ 75.897736][ T1582] device veth1_macvtap entered promiscuous mode [ 75.916545][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 75.925987][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 75.934982][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 75.943829][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 75.951828][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 75.960463][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 75.969312][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 75.978068][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 75.989511][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 75.997935][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.009042][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 76.017374][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.047176][ T1583] device veth0_vlan entered promiscuous mode [ 76.060384][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.076259][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.084277][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.092081][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 76.100524][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 76.110303][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 76.118873][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 76.157560][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 76.169788][ T1583] device veth1_macvtap entered promiscuous mode [ 76.226024][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 76.235680][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.273695][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 76.312131][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 76.692971][ T1667] device sit0 entered promiscuous mode [ 77.534028][ T112] device bridge_slave_1 left promiscuous mode [ 77.540217][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.552397][ T112] device bridge_slave_0 left promiscuous mode [ 77.559066][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.569462][ T112] device bridge_slave_1 left promiscuous mode [ 77.576053][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.584899][ T112] device bridge_slave_0 left promiscuous mode [ 77.591060][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.599931][ T112] device bridge_slave_1 left promiscuous mode [ 77.606560][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.614846][ T112] device bridge_slave_0 left promiscuous mode [ 77.621155][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.630488][ T112] device veth1_macvtap left promiscuous mode [ 77.637052][ T112] device veth1_macvtap left promiscuous mode [ 77.645281][ T112] device veth1_macvtap left promiscuous mode [ 77.653543][ T112] device veth0_vlan left promiscuous mode [ 77.957053][ T1718] device wg2 entered promiscuous mode [ 78.577686][ T1763] device pim6reg1 entered promiscuous mode [ 79.890095][ T1810] џџџџџџ: renamed from vlan1 [ 80.760241][ T1828] device sit0 entered promiscuous mode [ 81.285122][ T1832] device sit0 left promiscuous mode [ 81.341470][ T1832] device sit0 entered promiscuous mode [ 81.404617][ T24] audit: type=1400 audit(1758238863.740:146): avc: denied { create } for pid=1831 comm="syz.8.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 81.689081][ T1835] device veth1_macvtap left promiscuous mode [ 81.729450][ T1835] device macsec0 entered promiscuous mode [ 82.045995][ T1884] device sit0 left promiscuous mode [ 82.376181][ T1913] syz.9.444[1913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.376293][ T1913] syz.9.444[1913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.824146][ T1955] syz.8.452[1955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.842032][ T1946] џџџџџџ: renamed from vlan1 [ 82.900580][ T1955] syz.8.452[1955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.912311][ T1957] device wg2 entered promiscuous mode [ 83.711427][ T1991] device sit0 left promiscuous mode [ 83.755400][ T1991] device sit0 entered promiscuous mode [ 84.625909][ T2032] device syzkaller0 entered promiscuous mode [ 84.851544][ T2061] device pim6reg1 entered promiscuous mode [ 84.965642][ T2075] device pim6reg1 entered promiscuous mode [ 85.154541][ T2093] device sit0 entered promiscuous mode [ 85.746265][ T24] audit: type=1400 audit(1758238868.080:147): avc: denied { create } for pid=2121 comm="syz.7.504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 85.857694][ T2122] device syzkaller0 entered promiscuous mode [ 85.977405][ T2147] device syzkaller0 entered promiscuous mode [ 87.724580][ T2268] syz.7.543[2268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.724638][ T2268] syz.7.543[2268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.942907][ T2266] device syzkaller0 entered promiscuous mode [ 88.340660][ T2291] device veth1_macvtap left promiscuous mode [ 88.349904][ T2291] device macsec0 entered promiscuous mode [ 88.414121][ T2300] device sit0 left promiscuous mode [ 88.476977][ T2307] device sit0 entered promiscuous mode [ 92.583126][ T2369] device wg2 left promiscuous mode [ 92.676516][ T2374] device veth1_to_team entered promiscuous mode [ 92.709950][ T2376] device wg2 entered promiscuous mode [ 92.903806][ T2395] device veth0_vlan left promiscuous mode [ 92.915626][ T2395] device veth0_vlan entered promiscuous mode [ 92.958545][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.967597][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.975378][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.213142][ T24] audit: type=1400 audit(1758238876.540:148): avc: denied { create } for pid=2441 comm="syz.7.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 94.267160][ T2445] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.276039][ T2445] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.373538][ T2460] device bridge_slave_1 left promiscuous mode [ 94.395579][ T2460] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.435599][ T2460] device bridge_slave_0 left promiscuous mode [ 94.458227][ T2460] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.645181][ T2462] device sit0 left promiscuous mode [ 94.799960][ T2463] device sit0 entered promiscuous mode [ 95.161259][ T2512] device pim6reg1 entered promiscuous mode [ 95.455011][ T2521] device syzkaller0 entered promiscuous mode [ 96.178255][ T24] audit: type=1400 audit(1758238878.510:149): avc: denied { create } for pid=2561 comm="syz.7.627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 96.262253][ T24] audit: type=1400 audit(1758238878.590:150): avc: denied { associate } for pid=2570 comm="syz.8.629" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 97.556007][ T24] audit: type=1400 audit(1758238879.890:151): avc: denied { ioctl } for pid=2641 comm="syz.8.649" path="pid:[4026532285]" dev="nsfs" ino=4026532285 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 98.175303][ T2684] device wg2 left promiscuous mode [ 98.250272][ T2691] device wg2 entered promiscuous mode [ 98.313973][ T24] audit: type=1400 audit(1758238880.650:152): avc: denied { create } for pid=2701 comm="syz.7.666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 98.914307][ T2776] device pim6reg1 entered promiscuous mode [ 99.398936][ T2802] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.407598][ T2802] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.519506][ T2804] device bridge_slave_1 left promiscuous mode [ 99.543700][ T2804] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.621164][ T2804] device bridge_slave_0 left promiscuous mode [ 99.633593][ T2804] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.781405][ T2816] device syzkaller0 entered promiscuous mode [ 100.318694][ T2862] device wg2 left promiscuous mode [ 100.383164][ T2862] device wg2 entered promiscuous mode [ 101.654974][ T2919] device sit0 left promiscuous mode [ 102.316424][ T24] audit: type=1400 audit(1758238884.650:153): avc: denied { create } for pid=2938 comm="syz.5.735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 102.952590][ T2973] ------------[ cut here ]------------ [ 102.958273][ T2973] trace type BPF program uses run-time allocation [ 102.978539][ T2973] WARNING: CPU: 0 PID: 2973 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 103.015198][ T2973] Modules linked in: [ 103.019149][ T2973] CPU: 0 PID: 2973 Comm: syz.8.743 Not tainted syzkaller #0 [ 103.043882][ T2973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 103.063473][ T2973] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 103.073432][ T2973] Code: 85 e9 14 fe ff ff e8 b9 fa ef ff 31 c0 e9 15 fe ff ff e8 ad fa ef ff c6 05 64 c4 2c 05 01 48 c7 c7 e0 77 05 85 e8 ea 84 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 103.104437][ T2973] RSP: 0018:ffffc900024d7468 EFLAGS: 00010246 [ 103.125803][ T2973] RAX: c137ee0912ee7200 RBX: 0000000000000001 RCX: 0000000000080000 [ 103.137464][ T2973] RDX: ffffc9000189b000 RSI: 0000000000002323 RDI: 0000000000002324 [ 103.202303][ T2973] RBP: ffffc900024d74b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 103.259751][ T2973] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff8881283c0000 [ 103.337094][ T2973] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811fa97000 [ 103.366730][ T2973] FS: 00007fbec77336c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 103.398023][ T2973] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 103.420302][ T2973] CR2: 00007f00682fa6c0 CR3: 0000000115620000 CR4: 00000000003506b0 [ 103.443367][ T2973] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 103.461669][ T2973] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 103.502680][ T2973] Call Trace: [ 103.506591][ T2973] ? __fdget+0x1a1/0x230 [ 103.517529][ T2973] resolve_pseudo_ldimm64+0x526/0x1020 [ 103.537508][ T2973] ? bpf_check+0xd680/0xd680 [ 103.554541][ T2973] ? kvmalloc_node+0x88/0x130 [ 103.573393][ T2973] bpf_check+0x8d4b/0xd680 [ 103.583326][ T2973] ? bpf_get_btf_vmlinux+0x60/0x60 [ 103.598279][ T2973] ? bpf_prog_8bb90853150cd06d+0xda4/0xe58 [ 103.620022][ T2973] ? is_bpf_text_address+0x177/0x190 [ 103.635710][ T2973] ? selinux_bpf_prog_alloc+0x51/0x140 [ 103.644861][ T2973] ? __kernel_text_address+0xa0/0x100 [ 103.663489][ T2973] ? unwind_get_return_address+0x4d/0x90 [ 103.677181][ T2973] ? stack_trace_save+0xe0/0xe0 [ 103.691711][ T2973] ? arch_stack_walk+0xee/0x140 [ 103.699628][ T3012] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.707172][ T3012] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.731455][ T2973] ? stack_trace_save+0x98/0xe0 [ 103.743322][ T2973] ? stack_trace_snprint+0xf0/0xf0 [ 103.760913][ T2973] ? __kasan_slab_alloc+0x69/0xf0 [ 103.770414][ T2973] ? selinux_bpf_prog_alloc+0x51/0x140 [ 103.789637][ T2973] ? __kasan_kmalloc+0xec/0x110 [ 103.803314][ T2973] ? __kasan_kmalloc+0xda/0x110 [ 103.808247][ T2973] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 103.831920][ T2973] ? selinux_bpf_prog_alloc+0x51/0x140 [ 103.853000][ T2973] ? security_bpf_prog_alloc+0x62/0x90 [ 103.862565][ T2973] ? bpf_prog_load+0x949/0x1420 [ 103.883309][ T2973] ? __se_sys_bpf+0x442/0x680 [ 103.892722][ T2973] ? __x64_sys_bpf+0x7b/0x90 [ 103.899028][ T3012] device bridge_slave_1 left promiscuous mode [ 103.913387][ T3012] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.920677][ T2973] ? do_syscall_64+0x31/0x40 [ 103.930772][ T2973] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 103.937516][ T3012] device bridge_slave_0 left promiscuous mode [ 103.953346][ T2973] ? memset+0x35/0x40 [ 103.957476][ T2973] ? bpf_obj_name_cpy+0x193/0x1e0 [ 103.962635][ T2973] bpf_prog_load+0xf5a/0x1420 [ 103.967544][ T3012] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.983587][ T2973] ? map_freeze+0x320/0x320 [ 103.995083][ T2973] ? selinux_bpf+0xc7/0xf0 [ 104.003958][ T2973] ? security_bpf+0x82/0xa0 [ 104.013313][ T2973] __se_sys_bpf+0x442/0x680 [ 104.024854][ T2973] ? __x64_sys_bpf+0x90/0x90 [ 104.035054][ T2973] ? do_user_addr_fault+0x791/0xc80 [ 104.046849][ T2973] ? debug_smp_processor_id+0x17/0x20 [ 104.057943][ T2973] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 104.070863][ T2973] __x64_sys_bpf+0x7b/0x90 [ 104.082102][ T2973] do_syscall_64+0x31/0x40 [ 104.091219][ T2973] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 104.105195][ T2973] RIP: 0033:0x7fbec8cebba9 [ 104.115364][ T2973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.167896][ T2973] RSP: 002b:00007fbec7733038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 104.213758][ T2973] RAX: ffffffffffffffda RBX: 00007fbec8f33090 RCX: 00007fbec8cebba9 [ 104.232194][ T2973] RDX: 0000000000000094 RSI: 00002000000004c0 RDI: 0000000000000005 [ 104.276521][ T2973] RBP: 00007fbec8d6ee19 R08: 0000000000000000 R09: 0000000000000000 [ 104.313821][ T2973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 104.332601][ T2973] R13: 00007fbec8f33128 R14: 00007fbec8f33090 R15: 00007ffffea5c638 [ 104.388966][ T2973] ---[ end trace 01ec3f56d6e75e24 ]--- [ 104.495565][ T3033] device pim6reg1 entered promiscuous mode [ 104.600064][ T3052] device wg2 entered promiscuous mode [ 105.862643][ T3149] device syzkaller0 entered promiscuous mode [ 106.077566][ T3157] device syzkaller0 entered promiscuous mode [ 106.340496][ T3180] device wg2 left promiscuous mode [ 106.469901][ T3194] device sit0 entered promiscuous mode [ 106.807204][ T3216] device wg2 entered promiscuous mode [ 107.545836][ T3265] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.588704][ T3265] device veth0_vlan left promiscuous mode [ 107.625495][ T3265] device veth0_vlan entered promiscuous mode [ 108.272918][ T3304] device syzkaller0 entered promiscuous mode [ 109.435235][ T3378] device syzkaller0 entered promiscuous mode [ 109.765136][ T3390] device syzkaller0 entered promiscuous mode [ 110.175054][ T3423] device sit0 left promiscuous mode [ 110.210230][ T3423] device sit0 entered promiscuous mode [ 110.290598][ T24] audit: type=1400 audit(1758238892.620:154): avc: denied { create } for pid=3425 comm="syz.7.878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 110.382709][ T3431] device syzkaller0 entered promiscuous mode [ 110.452170][ T3441] device wg2 left promiscuous mode [ 110.894608][ T3479] device wg2 left promiscuous mode [ 110.918679][ T3481] device veth1_to_team entered promiscuous mode [ 111.259242][ T3513] device wg2 entered promiscuous mode [ 111.361968][ T3516] device pim6reg1 entered promiscuous mode [ 111.584314][ T3527] device pim6reg1 entered promiscuous mode [ 112.637136][ T3560] GPL: port 1(erspan0) entered blocking state [ 112.644056][ T3560] GPL: port 1(erspan0) entered disabled state [ 112.650713][ T3560] device erspan0 entered promiscuous mode [ 112.684644][ T3551] GPL: port 1(erspan0) entered blocking state [ 112.691264][ T3551] GPL: port 1(erspan0) entered forwarding state [ 115.572020][ T3701] device veth0_vlan left promiscuous mode [ 115.606453][ T3701] device veth0_vlan entered promiscuous mode [ 115.641516][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.652110][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.660238][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 116.170986][ T3718] tap0: tun_chr_ioctl cmd 2148553947 [ 116.386526][ T3724] device veth0_vlan left promiscuous mode [ 116.398139][ T3724] device veth0_vlan entered promiscuous mode [ 116.737655][ T3735] device pim6reg1 entered promiscuous mode [ 116.832584][ T3743] syz.8.968[3743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.832624][ T3744] syz.8.968[3744] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.832629][ T3743] syz.8.968[3743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.856600][ T3744] syz.8.968[3744] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.860274][ T3745] syz.8.968[3745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.879500][ T3744] syz.8.968[3744] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.891525][ T3745] syz.8.968[3745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.967501][ T3743] device wg2 entered promiscuous mode [ 117.039092][ T3750] device syzkaller0 entered promiscuous mode [ 118.441437][ T3813] device syzkaller0 entered promiscuous mode [ 118.653328][ T3823] device lo entered promiscuous mode [ 119.305461][ T24] audit: type=1400 audit(1758238901.640:155): avc: denied { create } for pid=3848 comm="syz.7.1003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 120.343854][ T3875] device wg2 left promiscuous mode [ 120.350036][ T3876] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.357533][ T3876] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.419066][ T3875] device wg2 entered promiscuous mode [ 120.454009][ T3881] device syzkaller0 entered promiscuous mode [ 120.616127][ T24] audit: type=1400 audit(1758238902.950:156): avc: denied { read } for pid=3895 comm="syz.7.1018" dev="nsfs" ino=4026533064 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 120.659422][ T24] audit: type=1400 audit(1758238902.970:157): avc: denied { open } for pid=3895 comm="syz.7.1018" path="cgroup:[4026533064]" dev="nsfs" ino=4026533064 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 121.403845][ T3937] device bridge_slave_1 left promiscuous mode [ 121.432068][ T3937] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.456173][ T3937] device bridge_slave_0 left promiscuous mode [ 121.467052][ T3937] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.631005][ T3953] device pim6reg1 entered promiscuous mode [ 121.894192][ T3975] device pim6reg1 entered promiscuous mode [ 122.005413][ T3991] device pim6reg1 entered promiscuous mode [ 122.529496][ T4017] device syzkaller0 entered promiscuous mode [ 122.771539][ T4023] syz.5.1053[4023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.771616][ T4023] syz.5.1053[4023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.799576][ T4023] device wg2 entered promiscuous mode [ 122.840889][ T4037] device syzkaller0 entered promiscuous mode [ 122.936896][ T4052] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.947903][ T4043] device pim6reg1 entered promiscuous mode [ 122.958150][ T4051] device bridge_slave_1 left promiscuous mode [ 122.967256][ T4051] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.977954][ T4051] device bridge_slave_0 left promiscuous mode [ 122.984487][ T4051] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.109021][ T4057] device veth0_vlan left promiscuous mode [ 123.121893][ T4057] device veth0_vlan entered promiscuous mode [ 123.155006][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.165335][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.173018][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 123.242357][ T4120] device syzkaller0 entered promiscuous mode [ 123.682946][ T24] audit: type=1400 audit(1758238906.010:158): avc: denied { create } for pid=4138 comm="syz.8.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 123.754624][ T4168] syz.8.1089[4168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.754685][ T4168] syz.8.1089[4168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.782467][ T4168] device veth0_vlan left promiscuous mode [ 123.813917][ T4168] device veth0_vlan entered promiscuous mode [ 123.903124][ T4183] device pim6reg1 entered promiscuous mode [ 123.964159][ T4187] device pim6reg1 entered promiscuous mode [ 124.668204][ T4213] device wg2 left promiscuous mode [ 124.697751][ T4217] device syzkaller0 entered promiscuous mode [ 124.705153][ T4212] device wg2 entered promiscuous mode [ 125.146185][ T4253] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 125.157932][ T4253] syzkaller0: linktype set to 1 [ 125.222036][ T4253] syzkaller0: tun_chr_ioctl cmd 35108 [ 125.271828][ T4253] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 126.048563][ T4287] device syzkaller0 entered promiscuous mode [ 126.569730][ T4303] device pim6reg1 entered promiscuous mode [ 128.400359][ T4398] device pim6reg1 entered promiscuous mode [ 128.724888][ T4401] device syzkaller0 entered promiscuous mode [ 128.944335][ T4411] device syzkaller0 entered promiscuous mode [ 129.077310][ T4418] device veth1_to_team entered promiscuous mode [ 129.190768][ T4418] device wg2 entered promiscuous mode [ 129.225016][ T24] audit: type=1400 audit(1758238911.560:159): avc: denied { create } for pid=4439 comm="syz.9.1174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 129.981186][ T4456] device veth0_vlan left promiscuous mode [ 130.046962][ T4456] device veth0_vlan entered promiscuous mode [ 130.227718][ T4480] €Т0: renamed from pim6reg1 [ 130.586586][ T24] audit: type=1400 audit(1758238912.920:160): avc: denied { ioctl } for pid=4491 comm="syz.6.1188" path="mnt:[4026532362]" dev="nsfs" ino=4026532362 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 131.015604][ T4536] device syzkaller0 entered promiscuous mode [ 137.836917][ T4563] device pim6reg1 entered promiscuous mode [ 138.512876][ T4590] device macsec0 entered promiscuous mode [ 138.537069][ T4590] device pim6reg1 entered promiscuous mode [ 139.225311][ T4645] device pim6reg1 entered promiscuous mode [ 139.242276][ T4645] device pim6reg1 left promiscuous mode [ 139.563521][ T4665] syz.6.1237[4665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.563581][ T4665] syz.6.1237[4665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.636136][ T4668] device syzkaller0 entered promiscuous mode [ 140.254630][ T24] audit: type=1400 audit(1758238922.590:161): avc: denied { create } for pid=4718 comm="syz.5.1253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 140.556719][ T24] audit: type=1400 audit(1758238922.890:162): avc: denied { create } for pid=4758 comm="syz.9.1264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 140.616087][ T4760] device sit0 entered promiscuous mode [ 140.660665][ T24] audit: type=1400 audit(1758238922.990:163): avc: denied { create } for pid=4763 comm="syz.7.1265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 141.162994][ T4784] device veth1_macvtap left promiscuous mode [ 141.330931][ T4803] device pim6reg1 entered promiscuous mode [ 141.948369][ T4870] device pim6reg1 left promiscuous mode [ 142.065142][ T4879] device wg2 left promiscuous mode [ 142.075968][ T4880] device sit0 left promiscuous mode [ 142.089609][ T4880] device sit0 entered promiscuous mode [ 142.106274][ T4874] device wg2 entered promiscuous mode [ 142.166454][ T4884] device syzkaller0 entered promiscuous mode [ 142.766584][ T4915] device sit0 entered promiscuous mode [ 142.905557][ T4925] device syzkaller0 entered promiscuous mode [ 143.350066][ T4952] device syzkaller0 entered promiscuous mode [ 145.055546][ T5024] device veth1_vlan entered promiscuous mode [ 145.999626][ T5072] device syzkaller0 entered promiscuous mode [ 146.164233][ T5089] Т: renamed from pim6reg1 [ 146.986971][ T5151] ЊЊЊЊЊЊ: renamed from vlan0 [ 147.565752][ T5172] device wg2 left promiscuous mode [ 149.584233][ T5308] device syzkaller0 entered promiscuous mode [ 151.602024][ T5375] device pim6reg1 entered promiscuous mode [ 151.680145][ T5375] tap0: tun_chr_ioctl cmd 35108 [ 151.917212][ T5392] device syzkaller0 entered promiscuous mode [ 152.379625][ T5404] device wg2 left promiscuous mode [ 152.509066][ T5412] device syzkaller0 entered promiscuous mode [ 152.546013][ T5418] device sit0 left promiscuous mode [ 152.754918][ T5424] device sit0 entered promiscuous mode [ 153.165065][ T24] audit: type=1400 audit(1758238935.490:164): avc: denied { create } for pid=5454 comm="syz.5.1463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 153.241294][ T5455] device pim6reg1 entered promiscuous mode [ 153.822132][ T5519] device macsec0 left promiscuous mode [ 153.960435][ T5541] device veth0_vlan left promiscuous mode [ 154.000432][ T5541] device veth0_vlan entered promiscuous mode [ 154.030211][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.047292][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.096862][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.283661][ T5610] syz.6.1500[5610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.306433][ T5607] device sit0 left promiscuous mode [ 156.334928][ T5635] device veth0_vlan left promiscuous mode [ 156.377182][ T5635] device veth0_vlan entered promiscuous mode [ 156.431328][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.442588][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 156.451411][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.869089][ T5693] device sit0 left promiscuous mode [ 157.844867][ T5755] syz.7.1540[5755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.844927][ T5755] syz.7.1540[5755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.879598][ T5757] syz.8.1541[5757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.893889][ T5757] syz.8.1541[5757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.875327][ T5836] device wg2 left promiscuous mode [ 158.917300][ T5836] syz.9.1563[5836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.917457][ T5836] syz.9.1563[5836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.081470][ T5882] tun0: tun_chr_ioctl cmd 2147767521 [ 160.170407][ T5897] tun0: tun_chr_ioctl cmd 1074025676 [ 160.177192][ T5897] tun0: owner set to 0 [ 160.180948][ T24] audit: type=1400 audit(1758238942.510:165): avc: denied { create } for pid=5895 comm="syz.8.1579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 160.434126][ T5894] device syzkaller0 entered promiscuous mode [ 161.079953][ T5939] device sit0 entered promiscuous mode [ 172.276654][ T6081] device wg2 entered promiscuous mode [ 173.279236][ T6157] device pim6reg1 entered promiscuous mode [ 173.343689][ T6170] device syzkaller0 entered promiscuous mode [ 173.867494][ T6195] device wg2 left promiscuous mode [ 174.125715][ T6216] device pim6reg1 entered promiscuous mode [ 174.831098][ T6246] device syzkaller0 entered promiscuous mode [ 175.640947][ T6288] device sit0 left promiscuous mode [ 175.955051][ T6303] device veth0_vlan left promiscuous mode [ 175.977150][ T6303] device veth0_vlan entered promiscuous mode [ 176.004536][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.054053][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 176.086597][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.242675][ T6348] device wg2 left promiscuous mode [ 176.340506][ T6356] device syzkaller0 entered promiscuous mode [ 176.731896][ T6374] device sit0 left promiscuous mode [ 176.983929][ T6380] device sit0 entered promiscuous mode [ 177.333268][ T6404] QБ6у`в˜: renamed from lo [ 177.446455][ T6413] device veth1_macvtap entered promiscuous mode [ 177.485399][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 178.113079][ T6421] device syzkaller0 entered promiscuous mode [ 178.815710][ T24] audit: type=1400 audit(1758238961.150:166): avc: denied { create } for pid=6445 comm="syz.9.1731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 179.485376][ T6507] device syzkaller0 entered promiscuous mode [ 180.006700][ T6568] device pim6reg1 entered promiscuous mode [ 180.411605][ T6615] device pim6reg1 entered promiscuous mode [ 180.855470][ T6638] device pim6reg1 entered promiscuous mode [ 181.729975][ T6700] device syzkaller0 entered promiscuous mode [ 184.507725][ T6862] device wg2 entered promiscuous mode [ 185.227956][ T6897] device veth0_vlan left promiscuous mode [ 185.256847][ T6897] device veth0_vlan entered promiscuous mode [ 185.294186][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.314756][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.355236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 186.538804][ T6975] device syzkaller0 entered promiscuous mode [ 187.384117][ T7026] device sit0 left promiscuous mode [ 187.538273][ T7031] device sit0 entered promiscuous mode [ 188.152952][ T7086] device pim6reg1 entered promiscuous mode [ 188.447961][ T7102] device wg2 entered promiscuous mode [ 188.802681][ T7138] device wg2 left promiscuous mode [ 190.287231][ T7233] device syzkaller0 entered promiscuous mode [ 190.836408][ T7257] device syzkaller0 entered promiscuous mode [ 190.877005][ T7277] Ÿы: port 1(veth0_vlan) entered blocking state [ 190.888740][ T7277] Ÿы: port 1(veth0_vlan) entered disabled state [ 191.086888][ T7298] device wg2 left promiscuous mode [ 191.111403][ T7300] device sit0 left promiscuous mode [ 191.147112][ T7304] device wg2 entered promiscuous mode [ 191.338896][ T7321] syz.8.1973[7321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.338951][ T7321] syz.8.1973[7321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.490499][ T7336] device sit0 entered promiscuous mode [ 191.858166][ T7340] device wg2 left promiscuous mode [ 191.902241][ T7341] device wg2 entered promiscuous mode [ 192.160516][ T7360] device dummy0 entered promiscuous mode [ 192.387530][ T7371] device wg2 left promiscuous mode [ 193.495116][ T7428] device pim6reg1 entered promiscuous mode [ 193.980870][ T7453] device syzkaller0 entered promiscuous mode [ 194.675326][ T7536] device wg2 entered promiscuous mode [ 194.968570][ T7554] ЊЊЊЊЊЊ: renamed from vlan0 [ 194.997216][ T7554] device syzkaller0 entered promiscuous mode [ 195.076418][ T7552] device wg2 entered promiscuous mode [ 195.126502][ T7565] device pim6reg1 entered promiscuous mode [ 196.679994][ T7618] device syzkaller0 entered promiscuous mode [ 197.151565][ T7651] device veth0_vlan left promiscuous mode [ 197.158189][ T7651] device veth0_vlan entered promiscuous mode [ 197.167863][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.195124][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 197.283664][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.353081][ T7700] device veth1_macvtap left promiscuous mode [ 198.361480][ T7700] device macsec0 left promiscuous mode [ 198.591114][ T7707] device sit0 left promiscuous mode [ 198.736575][ T7718] device sit0 entered promiscuous mode [ 199.169763][ T7741] device syzkaller0 entered promiscuous mode [ 199.954701][ T7790] device sit0 left promiscuous mode [ 199.993931][ T7786] device pim6reg1 entered promiscuous mode [ 200.018946][ T7790] device sit0 entered promiscuous mode [ 200.646887][ T7828] syz.6.2117[7828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.646936][ T7828] syz.6.2117[7828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.014751][ T24] audit: type=1400 audit(1758238983.350:167): avc: denied { create } for pid=7853 comm="syz.5.2127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 201.081152][ T7858] device veth0_vlan left promiscuous mode [ 201.097933][ T7858] device veth0_vlan entered promiscuous mode [ 201.363582][ T7877] syz.8.2131[7877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.363661][ T7877] syz.8.2131[7877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.908726][ T7897] device veth0_vlan left promiscuous mode [ 201.988049][ T7897] device veth0_vlan entered promiscuous mode [ 202.776437][ T7944] device pim6reg1 entered promiscuous mode [ 203.614518][ T7993] device dummy0 entered promiscuous mode [ 203.719321][ T8010] device syzkaller0 entered promiscuous mode [ 204.721342][ T8059] device veth0_vlan left promiscuous mode [ 204.746305][ T8059] device veth0_vlan entered promiscuous mode [ 204.788605][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.797447][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.814466][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 204.828324][ T8063] device sit0 entered promiscuous mode [ 205.152288][ T8094] device syzkaller0 entered promiscuous mode [ 205.323802][ T8092] : port 1(erspan0) entered blocking state [ 205.334665][ T8092] : port 1(erspan0) entered disabled state [ 205.350418][ T8092] device erspan0 entered promiscuous mode [ 206.069578][ T8153] device sit0 left promiscuous mode [ 207.086531][ T8189] device veth0_vlan left promiscuous mode [ 207.118185][ T8189] device veth0_vlan entered promiscuous mode [ 207.155867][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.176263][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.204160][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 208.239395][ T8248] batadv0: tun_chr_ioctl cmd 2147767521 [ 208.536547][ T8251] device syzkaller0 entered promiscuous mode [ 209.617715][ T8315] device pim6reg1 entered promiscuous mode [ 209.638700][ T24] audit: type=1400 audit(1758238991.970:168): avc: denied { create } for pid=8322 comm="syz.5.2256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 209.904573][ T8344] tap0: tun_chr_ioctl cmd 1074025675 [ 209.950499][ T8344] tap0: persist enabled [ 209.999142][ T8348] tap0: tun_chr_ioctl cmd 1074025675 [ 210.038846][ T8348] tap0: persist disabled [ 210.665002][ T8381] device syzkaller0 entered promiscuous mode [ 211.565106][ T8450] device pim6reg1 entered promiscuous mode [ 213.016980][ T8539] device wg2 left promiscuous mode [ 213.860636][ T8575] device syzkaller0 entered promiscuous mode [ 214.988736][ T8627] device syzkaller0 entered promiscuous mode [ 215.780885][ T8708] device sit0 entered promiscuous mode [ 216.153888][ T8730] device sit0 left promiscuous mode [ 216.722264][ T8762] device veth0_vlan left promiscuous mode [ 216.762796][ T8762] device veth0_vlan entered promiscuous mode [ 216.781261][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.793986][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.812081][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.849637][ T8776] device wg2 entered promiscuous mode [ 217.158558][ T8798] device wg2 left promiscuous mode [ 217.186951][ T8798] device wg2 entered promiscuous mode [ 217.243331][ T8806] device sit0 entered promiscuous mode [ 218.091049][ T8840] -1: renamed from syzkaller0 [ 218.736804][ T8876] device aaaaaaaaaaaaaaa entered promiscuous mode [ 219.063760][ T8880] syz.9.2417[8880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.914601][ T8926] device syzkaller0 entered promiscuous mode [ 220.003427][ T8932] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 220.758449][ T8970] device veth0_vlan left promiscuous mode [ 220.782403][ T8970] device veth0_vlan entered promiscuous mode [ 220.823712][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.871477][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 220.890107][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.144639][ T9000] device syzkaller0 entered promiscuous mode [ 221.700410][ T9054] device sit0 left promiscuous mode [ 221.787555][ T9055] device sit0 entered promiscuous mode [ 222.009283][ T9054] device wg2 left promiscuous mode [ 222.205201][ T9061] device macsec0 entered promiscuous mode [ 222.426891][ T9085] device syzkaller0 entered promiscuous mode [ 222.476423][ T9098] device macsec0 left promiscuous mode [ 222.516912][ T9098] device veth1_macvtap entered promiscuous mode [ 222.539429][ T9098] device macsec0 entered promiscuous mode [ 222.566878][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 222.582658][ T9106] device syzkaller0 entered promiscuous mode [ 223.983198][ T9189] device veth0_vlan left promiscuous mode [ 223.994110][ T9189] device veth0_vlan entered promiscuous mode [ 224.014636][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.027447][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.035457][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.106739][ T9198] device syzkaller0 entered promiscuous mode [ 224.890123][ T9256] device pim6reg1 entered promiscuous mode [ 227.105547][ T9331] device veth1_macvtap entered promiscuous mode [ 227.121631][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 227.936651][ T9389] device syzkaller0 entered promiscuous mode [ 228.868820][ T9449] device syzkaller0 entered promiscuous mode [ 229.751336][ T9536] device pim6reg1 entered promiscuous mode [ 230.380444][ T9579] device veth1_macvtap left promiscuous mode [ 230.548497][ T9588] device aaaaaaaaaaaaaaa entered promiscuous mode [ 230.671869][ T9595] device syzkaller0 entered promiscuous mode [ 230.936171][ T9611] device syzkaller0 entered promiscuous mode [ 231.093483][ T9630] device pim6reg1 entered promiscuous mode [ 231.294480][ T9638] device wg2 entered promiscuous mode [ 231.474575][ T9648] device sit0 left promiscuous mode [ 231.676961][ T9650] device sit0 entered promiscuous mode [ 232.103268][ T9667] device pim6reg1 entered promiscuous mode [ 232.194144][ T9676] device pim6reg1 entered promiscuous mode [ 232.229990][ T9678] device wg2 left promiscuous mode [ 232.673799][ T9701] device pim6reg1 entered promiscuous mode [ 233.501682][ T9753] @0й: renamed from bond_slave_1 [ 233.750167][ T9766] cgroup: fork rejected by pids controller in /syz8 [ 234.413934][ T24] audit: type=1400 audit(1758239016.750:169): avc: denied { mounton } for pid=9807 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 234.894315][ T9810] device syzkaller0 entered promiscuous mode [ 234.930021][ T9807] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.937882][ T9807] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.945713][ T9807] device bridge_slave_0 entered promiscuous mode [ 234.952809][ T9807] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.964513][ T9807] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.976388][ T9807] device bridge_slave_1 entered promiscuous mode [ 235.117852][ T9838] device macsec0 left promiscuous mode [ 235.144331][ T9807] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.151502][ T9807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.159000][ T9807] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.166134][ T9807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.225808][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.241187][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.249658][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.277594][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.286273][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.293512][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.310507][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.320264][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.343652][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.350758][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.400801][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.424343][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.432906][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.477770][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.511093][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 235.520654][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 235.532490][ T9807] device veth0_vlan entered promiscuous mode [ 235.553288][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 235.566060][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.590280][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.630711][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.740364][ T9903] device syzkaller0 entered promiscuous mode [ 235.767264][ T9905] device syzkaller0 entered promiscuous mode [ 235.796956][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.816223][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.863784][ T9807] device veth1_macvtap entered promiscuous mode [ 235.883758][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 235.891894][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 235.903632][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 235.948384][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 235.963114][ T24] audit: type=1400 audit(1758239018.290:170): avc: denied { unmount } for pid=9807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 235.964531][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 236.345883][ T9920] device sit0 left promiscuous mode [ 236.764467][ T1604] GPL: port 1(erspan0) entered disabled state [ 236.789678][ T1604] device erspan0 left promiscuous mode [ 236.812917][ T1604] GPL: port 1(erspan0) entered disabled state [ 237.055436][ T1604] Ÿы: port 1(veth0_vlan) entered disabled state [ 237.765373][T10004] device pim6reg1 entered promiscuous mode [ 237.921418][T10021] device syzkaller0 entered promiscuous mode [ 238.828198][T10053] device veth0_vlan left promiscuous mode [ 238.868527][T10053] device veth0_vlan entered promiscuous mode [ 238.912305][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.921698][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 238.929982][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.609660][T10151] device veth0_vlan left promiscuous mode [ 240.624019][T10151] device veth0_vlan entered promiscuous mode [ 240.664061][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.680573][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.718690][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.806368][T10160] syz.7.2798[10160] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.806427][T10160] syz.7.2798[10160] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.131217][T10160] device veth0_vlan left promiscuous mode [ 241.169097][T10160] device veth0_vlan entered promiscuous mode [ 241.205408][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.215734][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 241.233802][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.280887][T10179] device syzkaller0 entered promiscuous mode [ 241.294589][T10198] cgroup: fork rejected by pids controller in /syz7 [ 241.434095][T10211] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 241.514687][T10213] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.523366][T10213] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.530670][T10213] device bridge_slave_0 entered promiscuous mode [ 241.538806][T10213] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.546002][T10213] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.553954][T10213] device bridge_slave_1 entered promiscuous mode [ 241.601418][T10213] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.608594][T10213] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.616052][T10213] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.623217][T10213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.639207][ T1604] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.666920][ T1604] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.704281][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.712154][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.747811][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.756503][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.765119][ T1604] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.772366][ T1604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.779854][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.788659][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.797141][ T1604] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.804206][ T1604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.815058][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.825633][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.834892][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.843620][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.869560][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.879235][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.897602][T10213] device veth0_vlan entered promiscuous mode [ 241.914195][T10213] device veth1_macvtap entered promiscuous mode [ 241.920847][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.929096][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.937558][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 241.946220][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 241.954876][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 241.962660][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.970826][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.008213][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 242.020641][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 242.040359][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 242.049300][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 243.375362][ T9913] device veth0_vlan left promiscuous mode [ 244.011683][T10354] device wg2 left promiscuous mode [ 244.037919][T10356] device wg2 entered promiscuous mode [ 244.737772][T10374] device syzkaller0 entered promiscuous mode [ 245.061412][T10401] syz.6.2863[10401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.061479][T10401] syz.6.2863[10401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.162845][T10401] syz.6.2863[10401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.187777][T10401] syz.6.2863[10401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.675628][T10421] device pim6reg1 entered promiscuous mode [ 246.609932][T10503] device wg2 left promiscuous mode [ 249.054995][T10584] syzkaller0: tun_net_xmit 76 [ 249.060111][T10584] syzkaller0: tun_net_xmit 48 [ 249.076844][T10726] syzkaller0: create flow: hash 3276588284 index 1 [ 249.083730][ C1] syzkaller0: tun_net_xmit 76 [ 249.108282][T10726] syzkaller0: delete flow: hash 3276588284 index 1 [ 250.395382][T10786] device syzkaller0 entered promiscuous mode [ 250.879058][T10851] device wg2 entered promiscuous mode [ 251.853737][T10903] device wg2 left promiscuous mode [ 251.871256][T10903] device wg2 entered promiscuous mode [ 252.141170][T10924] device syzkaller0 entered promiscuous mode [ 252.235124][T10929] device syzkaller0 entered promiscuous mode [ 253.111290][T10992] device syzkaller0 entered promiscuous mode [ 253.524163][T10996] device pim6reg1 entered promiscuous mode [ 254.047517][T11058] device lo left promiscuous mode [ 254.090810][T11058] device dummy0 left promiscuous mode [ 254.129592][T11058] QБ6уз\b‹ЁY­4: renamed from lo [ 254.161247][T11066] tap0: tun_chr_ioctl cmd 1074812118 [ 255.871041][T11155] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 255.902109][T11155] device syzkaller0 entered promiscuous mode [ 256.226125][T11181] device syzkaller0 entered promiscuous mode [ 256.600627][T11235] -1: renamed from syzkaller0 [ 257.772718][T11287] device veth1_macvtap entered promiscuous mode [ 257.780054][T11287] device macsec0 entered promiscuous mode [ 257.842143][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.874159][T11294] device wg2 entered promiscuous mode [ 257.952377][T11299] device sit0 entered promiscuous mode [ 258.128879][T11307] device veth0_vlan left promiscuous mode [ 258.145275][T11307] device veth0_vlan entered promiscuous mode [ 258.160366][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.168971][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.183656][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.383530][T11320] device sit0 entered promiscuous mode [ 259.155394][T11346] device pim6reg1 entered promiscuous mode [ 259.166919][T11351] tap0: tun_chr_ioctl cmd 1074025675 [ 259.172378][T11351] tap0: persist enabled [ 259.264266][T11353] device wg2 left promiscuous mode [ 260.060391][T11398] device pim6reg1 entered promiscuous mode [ 274.887997][T11474] device sit0 entered promiscuous mode [ 275.807415][T11530] device pim6reg1 entered promiscuous mode [ 276.038936][T11540] device sit0 left promiscuous mode [ 276.295963][T11525] device syzkaller0 entered promiscuous mode [ 276.317351][T11542] device sit0 entered promiscuous mode [ 277.034257][T11577] device sit0 left promiscuous mode [ 277.786131][T11622] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.793455][T11622] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.801017][T11622] device bridge_slave_0 entered promiscuous mode [ 277.808382][T11622] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.817289][T11622] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.825068][T11622] device bridge_slave_1 entered promiscuous mode [ 277.985847][T11646] syz.8.3215[11646] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.985932][T11646] syz.8.3215[11646] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.363189][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 278.422858][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.481409][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.530976][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.583891][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.591255][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.648231][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.661240][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.699330][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.706652][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.751110][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 278.835509][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.904685][T11683] device wg2 entered promiscuous mode [ 278.913308][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.988965][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 279.060388][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 279.072972][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.115780][T11622] device veth0_vlan entered promiscuous mode [ 279.123722][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 279.157286][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 279.278399][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 279.301925][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 279.386642][T11622] device veth1_macvtap entered promiscuous mode [ 279.444261][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 279.460086][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 279.499444][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 279.566853][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 279.590057][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 279.785080][T11717] device syzkaller0 entered promiscuous mode [ 279.828016][ T9913] device veth1_macvtap left promiscuous mode [ 279.837334][ T9913] device veth0_vlan left promiscuous mode [ 280.260377][T11730] device syzkaller0 entered promiscuous mode [ 280.286270][T11733] device pim6reg1 left promiscuous mode [ 280.449742][T11746] device veth1_macvtap left promiscuous mode [ 280.459380][T11746] device macsec0 left promiscuous mode [ 280.485528][T11746] device veth1_macvtap entered promiscuous mode [ 280.503875][T11746] device macsec0 entered promiscuous mode [ 280.726886][T11757] device syzkaller0 entered promiscuous mode [ 281.113592][T11765] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 281.160534][T11764] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 281.847614][T11832] џџџџџџ: renamed from vlan1 [ 282.874831][T11906] device syzkaller0 entered promiscuous mode [ 282.950680][T11912] device syzkaller0 entered promiscuous mode [ 283.893553][T11995] QБ6уз\b‹ЁY­4: renamed from lo [ 285.892614][T12046] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.923677][T12046] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.931158][T12046] device bridge_slave_0 entered promiscuous mode [ 285.981853][T12046] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.000700][T12046] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.009504][T12046] device bridge_slave_1 entered promiscuous mode [ 286.220997][T12046] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.228182][T12046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.235576][T12046] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.242700][T12046] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.417889][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 286.431315][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.457075][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.532428][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 286.573433][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.580620][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.633267][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.661943][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.669073][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.713430][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.730890][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.763320][T12125] device sit0 left promiscuous mode [ 286.838663][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.863695][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.896535][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 286.912536][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.963622][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.979454][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 287.027975][T12046] device veth0_vlan entered promiscuous mode [ 287.072978][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 287.098443][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 287.175061][T12046] device veth1_macvtap entered promiscuous mode [ 287.202352][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 287.222483][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 287.247524][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 287.380684][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 287.402181][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 288.407039][T12202] device veth0_vlan left promiscuous mode [ 288.434401][T12202] device veth0_vlan entered promiscuous mode [ 288.732926][ T9913] device veth1_macvtap left promiscuous mode [ 289.421075][T12244] device syzkaller0 entered promiscuous mode [ 289.785107][T12276] device veth0_vlan left promiscuous mode [ 289.803436][T12276] device veth0_vlan entered promiscuous mode [ 290.369961][T12287] device syzkaller0 entered promiscuous mode [ 290.660403][T12320] device syzkaller0 entered promiscuous mode [ 292.237873][T12419] device veth1_macvtap left promiscuous mode [ 292.921155][T12444] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.992309][T12444] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.040410][T12444] device bridge_slave_0 entered promiscuous mode [ 293.179947][T12459] device syzkaller0 entered promiscuous mode [ 293.232064][T12444] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.243017][T12444] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.272041][T12444] device bridge_slave_1 entered promiscuous mode [ 293.922621][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 293.932578][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.952571][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.971265][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.986407][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.993590][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.037874][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.058268][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 294.070896][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.089962][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.097074][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.165550][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.183538][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.212293][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 294.258406][T12444] device veth0_vlan entered promiscuous mode [ 294.273753][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.282086][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.313505][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.356433][T12444] device veth1_macvtap entered promiscuous mode [ 294.405728][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.467365][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 294.483618][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 295.232623][ T9913] device erspan0 left promiscuous mode [ 295.251584][ T9913] : port 1(erspan0) entered disabled state [ 295.480215][ T9913] device veth1_macvtap left promiscuous mode [ 296.638347][T12629] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.646693][T12629] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.701166][T12630] device veth0_to_team entered promiscuous mode [ 296.801009][T12629] device bridge_slave_1 left promiscuous mode [ 296.815912][T12629] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.832391][T12629] device bridge_slave_0 left promiscuous mode [ 296.842349][T12629] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.273937][T12653] device pim6reg1 entered promiscuous mode [ 297.845412][T12693] device syzkaller0 entered promiscuous mode [ 298.611819][T12733] device veth0_vlan left promiscuous mode [ 298.628566][T12733] device veth0_vlan entered promiscuous mode [ 300.145975][T12822] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.153304][T12822] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.593557][T12854] device sit0 entered promiscuous mode [ 301.071109][T12871] Бџ: renamed from team_slave_1 [ 301.743109][T12920] device pim6reg1 entered promiscuous mode [ 302.231390][T12958] device syzkaller0 entered promiscuous mode [ 302.484981][T12969] device wg2 entered promiscuous mode [ 302.621624][T12977] device sit0 left promiscuous mode [ 302.785901][T12991] device sit0 entered promiscuous mode [ 302.908706][T13007] device sit0 left promiscuous mode [ 302.981885][T13013] device sit0 entered promiscuous mode [ 307.291426][T13074] device syzkaller0 entered promiscuous mode [ 307.705229][T13112] device pim6reg1 entered promiscuous mode [ 308.785325][T13145] device syzkaller0 entered promiscuous mode [ 308.824151][T13151] device syzkaller0 entered promiscuous mode [ 308.945523][T13159] syz.7.3628[13159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.948175][T13159] syz.7.3628[13159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.196173][T13168] device pim6reg1 entered promiscuous mode [ 309.465659][T13196] device syzkaller0 entered promiscuous mode [ 309.905665][T13228] device syzkaller0 entered promiscuous mode [ 310.753696][T13302] device pim6reg1 entered promiscuous mode [ 311.241338][T13310] tap1: tun_chr_ioctl cmd 35108 [ 312.580236][T13424] device sit0 entered promiscuous mode [ 312.962258][T13436] device pim6reg1 entered promiscuous mode [ 313.381735][T13467] device syzkaller0 entered promiscuous mode [ 313.408046][T13473] syz.6.3712[13473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.408107][T13473] syz.6.3712[13473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.324147][T13533] device syzkaller0 entered promiscuous mode [ 314.781327][T13568] device syzkaller0 entered promiscuous mode [ 314.808879][T13569] device sit0 entered promiscuous mode [ 315.839539][T13617] device macsec0 entered promiscuous mode [ 316.330542][T13641] device wg2 entered promiscuous mode [ 317.079873][T13676] device veth0_vlan left promiscuous mode [ 317.103207][T13676] device veth0_vlan entered promiscuous mode [ 317.146460][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.158992][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.171293][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 317.267677][T13689] device syzkaller0 entered promiscuous mode [ 317.408578][T13699] syz.9.3782[13699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.408630][T13699] syz.9.3782[13699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.670402][T13725] device bridge_slave_1 left promiscuous mode [ 317.691967][T13725] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.703895][T13725] device bridge_slave_0 left promiscuous mode [ 317.760242][T13725] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.080786][T13743] Бџ: renamed from team_slave_1 [ 318.681185][T13763] џџџџџџ: renamed from vlan1 [ 318.915646][T13786] device syzkaller0 entered promiscuous mode [ 319.679937][T13828] device syzkaller0 entered promiscuous mode [ 320.154449][T13836] device pim6reg1 entered promiscuous mode [ 320.348013][T13850] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.355390][T13850] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.408801][T13848] device bridge_slave_1 left promiscuous mode [ 320.420655][T13848] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.439284][T13848] device bridge_slave_0 left promiscuous mode [ 320.473399][T13848] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.377727][T13884] device syzkaller0 entered promiscuous mode [ 322.598347][T13934] device sit0 left promiscuous mode [ 323.484365][T13995] device veth1_macvtap left promiscuous mode [ 323.876581][T14022] device pim6reg1 entered promiscuous mode [ 325.362725][T14101] device pim6reg1 entered promiscuous mode [ 327.961209][T14207] device sit0 left promiscuous mode [ 327.987096][T14207] device sit0 entered promiscuous mode [ 328.264959][T14236] device veth0_vlan left promiscuous mode [ 328.276223][T14236] device veth0_vlan entered promiscuous mode [ 328.291155][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 328.316937][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 328.370749][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 328.657245][T14262] device wg2 left promiscuous mode [ 328.893252][T14286] device pim6reg1 entered promiscuous mode [ 329.392590][T14309] device pim6reg1 entered promiscuous mode [ 330.492068][T14353] syz.8.3968[14353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.492134][T14353] syz.8.3968[14353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.505983][T14351] device veth0_vlan left promiscuous mode [ 330.587829][T14351] device veth0_vlan entered promiscuous mode [ 330.621595][T14360] device syzkaller0 entered promiscuous mode [ 331.007121][T14376] device pim6reg1 entered promiscuous mode [ 331.305531][T14405] device pim6reg1 entered promiscuous mode [ 331.500489][T14416] device wg2 entered promiscuous mode [ 331.607183][T14425] device veth0_vlan left promiscuous mode [ 331.621731][T14425] device veth0_vlan entered promiscuous mode [ 331.757343][T14432] ЊЊЊЊЊЛ: renamed from vlan0 [ 334.275887][T14547] device veth0_vlan left promiscuous mode [ 334.308388][T14547] device veth0_vlan entered promiscuous mode [ 334.381270][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.425456][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЛ: link becomes ready [ 334.474562][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 335.115840][T14581] syz.7.4036[14581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.115932][T14581] syz.7.4036[14581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.526216][T14625] device pim6reg1 entered promiscuous mode [ 337.719438][T14655] device sit0 left promiscuous mode [ 337.911638][T14660] device syzkaller0 entered promiscuous mode [ 338.038038][T14655] device sit0 entered promiscuous mode [ 338.800513][T14706] device syzkaller0 left promiscuous mode [ 339.659881][T14788] device syzkaller0 entered promiscuous mode [ 341.001559][T14866] device sit0 entered promiscuous mode [ 341.241102][T14870] device syzkaller0 entered promiscuous mode [ 341.944255][T14888] device veth0_vlan left promiscuous mode [ 341.950686][T14888] device veth0_vlan entered promiscuous mode [ 341.958655][T14894] device veth1_macvtap left promiscuous mode [ 342.641964][T14925] device pim6reg1 entered promiscuous mode [ 342.698262][T14927] device pim6reg1 entered promiscuous mode [ 343.385469][T14960] device pim6reg1 entered promiscuous mode [ 344.261935][T15029] syz.8.4154[15029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.262022][T15029] syz.8.4154[15029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.633630][T15110] device wg2 left promiscuous mode [ 345.681508][T15110] device wg2 entered promiscuous mode [ 345.791698][T15110] device syzkaller0 entered promiscuous mode [ 347.061341][T15184] device pim6reg1 entered promiscuous mode [ 347.242262][T15197] device veth0_vlan left promiscuous mode [ 347.257637][T15197] device veth0_vlan entered promiscuous mode [ 347.306280][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.343979][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.386930][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 347.989185][T15257] device veth1_macvtap left promiscuous mode [ 348.001949][T15257] device macsec0 left promiscuous mode [ 348.069478][T15265] syz.7.4222[15265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.069537][T15265] syz.7.4222[15265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.684594][T15304] device pim6reg1 entered promiscuous mode [ 348.765459][T15307] device pim6reg1 entered promiscuous mode [ 349.015618][T15324] syz.7.4240[15324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.015683][T15324] syz.7.4240[15324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.395941][T15370] syz.6.4251[15370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.488581][T15370] syz.6.4251[15370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.576333][T15384] device veth1_macvtap entered promiscuous mode [ 349.598249][T15384] device macsec0 entered promiscuous mode [ 349.648975][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 349.994120][T15416] device pim6reg1 entered promiscuous mode [ 440.060376][T15456] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.067608][T15456] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.075957][T15456] device bridge_slave_0 entered promiscuous mode [ 440.103203][T15458] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.110247][T15458] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.117860][T15458] device bridge_slave_0 entered promiscuous mode [ 440.126719][T15458] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.133938][T15458] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.141756][T15458] device bridge_slave_1 entered promiscuous mode [ 440.151074][T15456] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.158396][T15456] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.166066][T15456] device bridge_slave_1 entered promiscuous mode [ 440.226179][T15457] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.233506][T15457] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.241219][T15457] device bridge_slave_0 entered promiscuous mode [ 440.248549][T15457] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.255602][T15457] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.263408][T15457] device bridge_slave_1 entered promiscuous mode [ 440.275605][T15459] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.282753][T15459] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.290580][T15459] device bridge_slave_0 entered promiscuous mode [ 440.321124][T15459] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.328349][T15459] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.336211][T15459] device bridge_slave_1 entered promiscuous mode [ 440.402839][T15460] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.410028][T15460] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.417559][T15460] device bridge_slave_0 entered promiscuous mode [ 440.426824][T15460] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.434070][T15460] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.441914][T15460] device bridge_slave_1 entered promiscuous mode [ 440.525986][T15456] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.533158][T15456] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.540397][T15456] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.547598][T15456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.560349][T15460] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.567527][T15460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.574828][T15460] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.582175][T15460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.599290][T15457] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.606726][T15457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.614241][T15457] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.621566][T15457] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.637017][T15459] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.644346][T15459] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.651800][T15459] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.659106][T15459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.672010][T15458] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.679077][T15458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.686580][T15458] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.693986][T15458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.710397][ T9913] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.717838][ T9913] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.725627][ T9913] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.733012][ T9913] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.740542][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 440.748226][ T9913] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.755523][ T9913] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.762972][ T9913] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.770411][ T9913] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.778246][ T9913] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.785603][ T9913] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.816070][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 440.824567][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.832831][ T9913] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.840069][ T9913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.848196][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.856941][ T9913] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.864371][ T9913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.898570][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 440.907013][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.917954][ T9913] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.925298][ T9913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.933338][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 440.940844][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 440.948687][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 440.957526][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.965871][ T9913] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.972897][ T9913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.981036][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 440.989568][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.998661][ T9913] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.005811][ T9913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.013478][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 441.021729][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 441.030223][ T9913] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.037275][ T9913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.066729][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 441.075594][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 441.084298][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 441.092265][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 441.100551][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 441.108189][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 441.115889][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 441.124014][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 441.131963][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 441.140558][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 441.148729][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 441.157116][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 441.165518][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 441.173776][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.181977][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.189723][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.200750][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 441.209458][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 441.217930][ T9913] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.224970][ T9913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.232647][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 441.241318][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 441.249858][ T9913] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.257431][ T9913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.266079][T15456] device veth0_vlan entered promiscuous mode [ 441.294955][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 441.303918][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 441.342216][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 441.350070][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 441.360157][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 441.368578][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 441.377371][ T9913] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.384596][ T9913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.392075][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 441.400993][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 441.409498][ T9913] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.416555][ T9913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.426687][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 441.434908][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 441.461262][T15459] device veth0_vlan entered promiscuous mode [ 441.469693][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.478520][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.486187][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.494145][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 441.502129][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 441.510485][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 441.518601][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 441.529403][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 441.540271][T15456] device veth1_macvtap entered promiscuous mode [ 441.555683][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 441.563951][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 441.572182][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 441.580852][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 441.589131][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 441.599891][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 441.608516][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 441.621910][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 441.645243][T15459] device veth1_macvtap entered promiscuous mode [ 441.653539][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 441.662588][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 441.675398][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 441.684209][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 441.693643][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.702095][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.710253][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.727893][T15458] device veth0_vlan entered promiscuous mode [ 441.737681][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 441.747338][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.755717][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.763562][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.771015][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 441.779543][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 441.788489][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 441.797431][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 441.806608][T15460] device veth0_vlan entered promiscuous mode [ 441.857076][T15457] device veth0_vlan entered promiscuous mode [ 441.866407][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 441.875059][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 441.883392][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 441.891645][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.900266][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.908040][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.917631][T15458] device veth1_macvtap entered promiscuous mode [ 441.932914][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 441.940864][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 441.949404][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 441.959885][T15460] device veth1_macvtap entered promiscuous mode [ 441.989735][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 442.002364][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 442.011198][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 442.020138][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 442.028661][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 442.073442][T15457] device veth1_macvtap entered promiscuous mode [ 442.108466][ T306] device bridge_slave_1 left promiscuous mode [ 442.116689][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.124575][ T306] device bridge_slave_0 left promiscuous mode [ 442.130881][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.140406][ T306] device bridge_slave_1 left promiscuous mode [ 442.147148][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.155138][ T306] device bridge_slave_0 left promiscuous mode [ 442.161450][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.173767][ T306] device veth0_vlan left promiscuous mode [ 442.180375][ T306] device veth1_macvtap left promiscuous mode [ 442.186716][ T306] device veth0_vlan left promiscuous mode [ 442.192747][ T306] device veth0_vlan left promiscuous mode [ 442.203346][ T306] device veth1_macvtap left promiscuous mode [ 442.209616][ T306] device veth0_vlan left promiscuous mode [ 442.545039][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 442.561674][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 442.571660][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 442.580406][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 442.589428][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 442.598441][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 442.610099][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 442.641313][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 442.650531][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 442.659370][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 442.673932][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 443.065601][T15523] tap0: tun_chr_ioctl cmd 1074025675 [ 443.071245][T15523] tap0: persist enabled [ 443.079150][T15523] tap0: tun_chr_ioctl cmd 1074025675 [ 443.084943][T15523] tap0: persist enabled [ 443.880943][T15543] device wg2 entered promiscuous mode [ 444.760373][T15599] device syzkaller0 entered promiscuous mode [ 444.930128][T15612] device pim6reg1 entered promiscuous mode [ 445.479906][T15650] device syzkaller0 entered promiscuous mode [ 446.526904][T15692] device veth0_vlan left promiscuous mode [ 446.560022][T15692] device veth0_vlan entered promiscuous mode [ 446.948405][T15699] device wg2 entered promiscuous mode [ 449.527886][T15778] џџџџџџ: renamed from vlan1 [ 450.471355][T15802] device wg2 entered promiscuous mode [ 450.831252][T15837] syz.3.4375[15837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.853779][T15837] syz.3.4375[15837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.940389][T15880] device pim6reg1 entered promiscuous mode [ 452.460164][ T24] audit: type=1400 audit(1758239234.790:171): avc: denied { create } for pid=15895 comm="syz.1.4395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 453.070978][T15935] device syzkaller0 entered promiscuous mode [ 453.891334][T15978] device sit0 entered promiscuous mode [ 455.123702][T16018] device sit0 entered promiscuous mode [ 455.424016][T16024] device veth0_vlan left promiscuous mode [ 455.502815][T16024] device veth0_vlan entered promiscuous mode [ 456.032242][T16046] device sit0 entered promiscuous mode [ 456.952210][T16065] ref_ctr_offset mismatch. inode: 0x63 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 456.999675][T16073] GPL: port 1(erspan0) entered blocking state [ 457.043229][T16073] GPL: port 1(erspan0) entered disabled state [ 457.065678][T16073] device erspan0 entered promiscuous mode [ 457.081209][T16074] GPL: port 1(erspan0) entered blocking state [ 457.087532][T16074] GPL: port 1(erspan0) entered forwarding state [ 457.352766][T16095] device wg2 left promiscuous mode [ 457.651774][T16104] device syzkaller0 entered promiscuous mode [ 458.454137][T16167] device pim6reg1 entered promiscuous mode [ 459.005584][T16200] device sit0 left promiscuous mode [ 459.069583][T16200] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.076864][T16200] bridge0: port 1(bridge_slave_0) entered disabled state [ 459.169719][T16200] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.176835][T16200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.184632][T16200] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.191843][T16200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.201760][T16200] device bridge0 entered promiscuous mode [ 459.229135][T16205] device sit0 entered promiscuous mode [ 459.736447][T16215] device veth0_vlan left promiscuous mode [ 459.748050][T16215] device veth0_vlan entered promiscuous mode [ 459.796427][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 459.809449][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 459.817750][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 460.642043][T16261] device syzkaller0 entered promiscuous mode [ 461.079631][T16266] device syzkaller0 entered promiscuous mode [ 463.254576][T16447] device sit0 left promiscuous mode [ 463.311098][T16447] device sit0 entered promiscuous mode [ 464.141776][T16472] device pim6reg1 entered promiscuous mode [ 464.306856][T16487] device pim6reg1 entered promiscuous mode [ 464.330154][T16490] device vlan1 entered promiscuous mode [ 464.728536][T16527] device veth0_vlan left promiscuous mode [ 464.773976][T16527] device veth0_vlan entered promiscuous mode [ 464.835532][T16546] device veth1_macvtap left promiscuous mode [ 464.875849][T16548] device sit0 entered promiscuous mode [ 464.979746][T16563] syz.0.4583[16563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.979820][T16563] syz.0.4583[16563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.377605][T16601] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.398547][T16601] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.657648][T16628] device sit0 left promiscuous mode [ 465.783608][T16629] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.790840][T16629] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.863872][T16632] device sit0 entered promiscuous mode [ 465.934700][T16629] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.941875][T16629] bridge0: port 2(bridge_slave_1) entered forwarding state [ 465.949270][T16629] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.956350][T16629] bridge0: port 1(bridge_slave_0) entered forwarding state [ 466.043192][T16629] device bridge0 entered promiscuous mode [ 466.083059][T16644] device sit0 left promiscuous mode [ 466.118516][T16644] device sit0 entered promiscuous mode [ 466.485138][T16663] device veth1_macvtap entered promiscuous mode [ 466.492557][T16663] device macsec0 entered promiscuous mode [ 466.509994][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 466.579731][T16682] device syzkaller0 entered promiscuous mode [ 466.820536][T16697] device pim6reg1 entered promiscuous mode [ 466.906818][T16696] device wg2 left promiscuous mode [ 468.835649][T16766] device wg2 entered promiscuous mode [ 468.939369][T16766] device veth0_vlan left promiscuous mode [ 468.968503][T16766] device veth0_vlan entered promiscuous mode [ 469.743227][T16831] device syzkaller0 entered promiscuous mode [ 469.752790][T16831] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 470.430198][T16863] device syzkaller0 entered promiscuous mode [ 470.507105][T16867] device sit0 left promiscuous mode [ 470.779072][T16883] device macsec0 entered promiscuous mode [ 470.861808][T16892] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.920301][T16895] device syzkaller0 entered promiscuous mode [ 473.283463][T16980] device sit0 left promiscuous mode [ 473.381696][T16982] device sit0 entered promiscuous mode [ 474.064222][T16996] device veth1_macvtap left promiscuous mode [ 474.070360][T16996] device macsec0 entered promiscuous mode [ 475.173422][T17070] device sit0 left promiscuous mode [ 475.715290][T17101] device syzkaller0 entered promiscuous mode [ 476.620400][T17126] device syzkaller0 entered promiscuous mode [ 476.856215][ T24] audit: type=1400 audit(1758239259.190:172): avc: denied { create } for pid=17151 comm="syz.3.4765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 476.967763][T17157] device veth1_macvtap left promiscuous mode [ 477.501884][T17188] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 477.542222][T17188] device syzkaller0 entered promiscuous mode [ 478.535458][T17233] device wg2 entered promiscuous mode [ 478.758335][T17241] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 478.832775][T17246] syz.2.4794[17246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.832835][T17246] syz.2.4794[17246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.967163][T17261] device syzkaller0 entered promiscuous mode [ 479.127082][T17278] device wg2 left promiscuous mode [ 479.147592][T17282] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.156491][T17282] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.405498][T17292] device syzkaller0 entered promiscuous mode [ 483.676111][T17387] device syzkaller0 entered promiscuous mode [ 484.422173][T17411] device syzkaller0 entered promiscuous mode [ 485.140357][T17447] syz.0.4849[17447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.140418][T17447] syz.0.4849[17447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.332333][T17455] џџџџџџ: renamed from vlan1 [ 485.748738][T17493] syz.0.4861[17493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.748795][T17493] syz.0.4861[17493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 486.011197][T17510] device wg2 entered promiscuous mode [ 486.153140][T17513] tap1: tun_chr_ioctl cmd 1074025677 [ 486.158482][T17513] tap1: linktype set to 774 [ 486.783555][T17537] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.790849][T17537] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.363804][T17591] -1: renamed from syzkaller0 [ 488.810577][T17635] device sit0 left promiscuous mode [ 489.087622][T17656] device syzkaller0 entered promiscuous mode [ 489.269509][T17663] device sit0 entered promiscuous mode [ 490.665013][T17742] syz.2.4935[17742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.665077][T17742] syz.2.4935[17742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.998863][T17774] device bridge_slave_1 left promiscuous mode [ 491.048662][T17774] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.079624][T17774] device bridge_slave_0 left promiscuous mode [ 491.094614][T17774] bridge0: port 1(bridge_slave_0) entered disabled state [ 491.300753][T17810] device wg2 entered promiscuous mode [ 493.016625][T17865] syz.2.4967[17865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.016711][T17865] syz.2.4967[17865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 502.141479][T17940] device syzkaller0 entered promiscuous mode [ 502.219176][T17969] device syzkaller0 entered promiscuous mode [ 502.851073][T18025] device lo entered promiscuous mode [ 504.029143][T18086] device syzkaller0 entered promiscuous mode [ 504.225360][T18096] device pim6reg1 entered promiscuous mode [ 504.475573][T18111] device sit0 left promiscuous mode [ 504.522086][T18109] device sit0 entered promiscuous mode [ 505.043324][T18140] device pim6reg1 entered promiscuous mode [ 505.971185][T18197] device sit0 entered promiscuous mode [ 506.072111][T18202] device veth0_vlan left promiscuous mode [ 506.101410][T18202] device veth0_vlan entered promiscuous mode [ 506.127575][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 506.146370][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 506.156726][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 507.481845][T18267] device sit0 left promiscuous mode [ 508.483962][T18317] device sit0 left promiscuous mode [ 508.798490][T18335] device syzkaller0 entered promiscuous mode [ 509.430148][T18380] syz.0.5120[18380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.430227][T18380] syz.0.5120[18380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.751557][T18463] device syzkaller0 entered promiscuous mode [ 511.810795][T18460] device syzkaller0 entered promiscuous mode [ 511.860533][T18468] device pim6reg1 entered promiscuous mode [ 512.820762][T18528] syz.3.5162[18528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 512.820845][T18528] syz.3.5162[18528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 513.631076][T18584] device sit0 left promiscuous mode [ 513.718199][T18584] device sit0 entered promiscuous mode [ 516.127849][T18641] : port 1(erspan0) entered blocking state [ 516.173174][T18641] : port 1(erspan0) entered disabled state [ 516.221341][T18641] device erspan0 entered promiscuous mode [ 516.293258][T18648] : port 1(erspan0) entered blocking state [ 516.299204][T18648] : port 1(erspan0) entered forwarding state [ 517.306205][T18721] device syzkaller0 entered promiscuous mode [ 517.584487][T18732] device syzkaller0 entered promiscuous mode [ 518.113561][T18744] device syzkaller0 entered promiscuous mode [ 518.319734][T18758] Бџ: renamed from team_slave_1 [ 519.095980][T18798] device sit0 entered promiscuous mode [ 519.384354][T18811] device pim6reg1 entered promiscuous mode [ 519.440061][T18825] device wg2 left promiscuous mode [ 519.813524][T18848] device pim6reg1 entered promiscuous mode [ 519.978106][T18870] device sit0 entered promiscuous mode [ 520.831523][T18930] device veth0_vlan left promiscuous mode [ 520.841771][T18930] device veth0_vlan entered promiscuous mode [ 520.860859][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 520.876105][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 520.892479][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 521.108795][T18943] device syzkaller0 entered promiscuous mode [ 521.435151][T18953] device pim6reg1 entered promiscuous mode [ 521.441788][T18955] device veth1_macvtap left promiscuous mode [ 521.449140][T18955] device macsec0 left promiscuous mode [ 521.915523][T18975] device pim6reg1 entered promiscuous mode [ 521.989196][T18975] device macsec0 entered promiscuous mode [ 522.586633][T19019] device sit0 entered promiscuous mode [ 522.604926][T19022] syz.2.5305[19022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 522.606604][T19022] syz.2.5305[19022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 522.720524][T19024] device syzkaller0 entered promiscuous mode [ 523.118103][T19052] device sit0 left promiscuous mode [ 523.180854][T19057] device macsec0 left promiscuous mode [ 523.193029][T19057] device sit0 entered promiscuous mode [ 523.348306][T19075] device wg2 left promiscuous mode [ 523.410796][T19075] device wg2 entered promiscuous mode [ 523.744926][T19116] device wg2 entered promiscuous mode [ 524.185389][T19131] device syzkaller0 entered promiscuous mode [ 524.918655][T19156] device pim6reg1 entered promiscuous mode [ 525.924580][T19239] syz.2.5369[19239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 525.924648][T19239] syz.2.5369[19239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.549089][T19265] device syzkaller0 entered promiscuous mode [ 527.127253][T19291] device syzkaller0 entered promiscuous mode [ 527.241653][T19325] syz.2.5392[19325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.241713][T19325] syz.2.5392[19325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.539746][T19338] device wg2 entered promiscuous mode [ 528.343769][T19379] device bridge_slave_1 left promiscuous mode [ 528.368133][T19379] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.398201][T19379] device bridge_slave_0 left promiscuous mode [ 528.473276][T19379] bridge0: port 1(bridge_slave_0) entered disabled state [ 528.556989][T19381] device sit0 left promiscuous mode [ 528.685145][T19388] device sit0 entered promiscuous mode [ 529.197294][T19413] device syzkaller0 entered promiscuous mode [ 529.421015][T19445] €Т0: renamed from pim6reg1 [ 529.714687][T19455] tun0: tun_chr_ioctl cmd 1074025678 [ 529.730743][T19455] tun0: group set to 1 [ 529.865408][T19466] device syzkaller0 entered promiscuous mode [ 529.918057][T19484] device syzkaller0 entered promiscuous mode [ 530.430495][T19506] device veth1_macvtap left promiscuous mode [ 530.437472][T19506] device macsec0 entered promiscuous mode [ 531.944413][T19587] device sit0 left promiscuous mode [ 532.304882][T19609] device syzkaller0 entered promiscuous mode [ 532.325995][T19617] device sit0 left promiscuous mode [ 532.359692][T19619] device sit0 entered promiscuous mode [ 533.628343][ T24] audit: type=1400 audit(1758239315.960:173): avc: denied { create } for pid=19661 comm="syz.3.5494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 534.063406][T19671] device sit0 left promiscuous mode [ 536.185054][T19751] device pim6reg1 entered promiscuous mode [ 536.284607][T19768] device pim6reg1 entered promiscuous mode [ 536.574792][T19813] device pim6reg1 entered promiscuous mode [ 537.125220][T19861] device syzkaller0 entered promiscuous mode [ 537.298596][T19872] device syzkaller0 entered promiscuous mode [ 538.309579][T19908] device syzkaller0 entered promiscuous mode [ 539.273989][T19979] device syzkaller0 entered promiscuous mode [ 539.831104][T20023] device syzkaller0 entered promiscuous mode [ 539.854920][T20009] device pim6reg1 entered promiscuous mode [ 540.065339][T20036] syz.0.5603[20036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 540.065396][T20036] syz.0.5603[20036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 540.099879][T20038] device syzkaller0 entered promiscuous mode [ 549.786599][T20082] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 550.452416][T20117] syz.1.5625[20117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.452486][T20117] syz.1.5625[20117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.468053][T20118] syz.1.5625[20118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.494448][T20118] syz.1.5625[20118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.107103][T20267] syz.2.5663[20267] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.234322][T20267] syz.2.5663[20267] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.599384][T20296] device pim6reg1 entered promiscuous mode [ 553.261008][T20335] device pim6reg1 entered promiscuous mode [ 553.455541][T20347] device sit0 left promiscuous mode [ 553.486077][T20347] device sit0 entered promiscuous mode [ 553.971385][T20370] bridge0: port 1(bridge_slave_0) entered disabled state [ 554.263771][T20408] device sit0 left promiscuous mode [ 554.354643][T20413] syz.3.5705[20413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 554.357328][T20413] syz.3.5705[20413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 554.423534][T20408] device sit0 entered promiscuous mode [ 555.346517][T20473] џџџџџџ: renamed from veth0_vlan [ 556.392598][T20552] device veth0_vlan left promiscuous mode [ 556.402595][T20552] device veth0_vlan entered promiscuous mode [ 556.424466][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 556.466673][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 556.480052][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 556.623537][T20580] device pim6reg1 entered promiscuous mode [ 556.706664][T20586] device pim6reg1 entered promiscuous mode [ 557.287363][T20627] device wg2 left promiscuous mode [ 557.737109][T20651] syz.2.5773[20651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 557.737188][T20651] syz.2.5773[20651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.650041][T20743] device macsec0 left promiscuous mode [ 558.674531][T20743] device veth1_macvtap entered promiscuous mode [ 558.681163][T20743] device macsec0 entered promiscuous mode [ 558.688519][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 559.871935][T20820] device syzkaller0 entered promiscuous mode [ 576.352134][T20869] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.359435][T20869] bridge0: port 1(bridge_slave_0) entered disabled state [ 576.367524][T20869] device bridge_slave_0 entered promiscuous mode [ 576.375168][T20869] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.382380][T20869] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.390235][T20869] device bridge_slave_1 entered promiscuous mode [ 576.413661][T20865] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.420822][T20865] bridge0: port 1(bridge_slave_0) entered disabled state [ 576.428348][T20865] device bridge_slave_0 entered promiscuous mode [ 576.438127][T20865] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.446214][T20865] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.455182][T20865] device bridge_slave_1 entered promiscuous mode [ 576.489429][T20866] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.496904][T20866] bridge0: port 1(bridge_slave_0) entered disabled state [ 576.504782][T20866] device bridge_slave_0 entered promiscuous mode [ 576.530427][T20866] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.537775][T20866] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.545326][T20866] device bridge_slave_1 entered promiscuous mode [ 576.551939][T20868] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.559096][T20868] bridge0: port 1(bridge_slave_0) entered disabled state [ 576.566829][T20868] device bridge_slave_0 entered promiscuous mode [ 576.591694][T20868] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.599565][T20868] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.607760][T20868] device bridge_slave_1 entered promiscuous mode [ 576.624609][T20867] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.631660][T20867] bridge0: port 1(bridge_slave_0) entered disabled state [ 576.639506][T20867] device bridge_slave_0 entered promiscuous mode [ 576.649179][T20867] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.656330][T20867] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.664243][T20867] device bridge_slave_1 entered promiscuous mode [ 576.789618][T20865] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.797112][T20865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 576.804575][T20865] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.811805][T20865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 576.831317][T20869] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.838381][T20869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 576.845663][T20869] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.852684][T20869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 576.869588][T20866] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.877157][T20866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 576.884453][T20866] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.891755][T20866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 576.906670][T20867] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.913905][T20867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 576.921330][T20867] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.928495][T20867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 576.941876][T20868] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.949038][T20868] bridge0: port 2(bridge_slave_1) entered forwarding state [ 576.956409][T20868] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.963515][T20868] bridge0: port 1(bridge_slave_0) entered forwarding state [ 577.136838][ T1604] bridge0: port 1(bridge_slave_0) entered disabled state [ 577.146106][ T1604] bridge0: port 1(bridge_slave_0) entered disabled state [ 577.153718][ T1604] bridge0: port 2(bridge_slave_1) entered disabled state [ 577.161600][ T1604] bridge0: port 2(bridge_slave_1) entered disabled state [ 577.169563][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 577.178216][ T1604] bridge0: port 1(bridge_slave_0) entered disabled state [ 577.185574][ T1604] bridge0: port 2(bridge_slave_1) entered disabled state [ 577.192907][ T1604] bridge0: port 1(bridge_slave_0) entered disabled state [ 577.200191][ T1604] bridge0: port 2(bridge_slave_1) entered disabled state [ 577.208277][ T1604] bridge0: port 1(bridge_slave_0) entered disabled state [ 577.215925][ T1604] bridge0: port 2(bridge_slave_1) entered disabled state [ 577.245373][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 577.263318][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 577.270881][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 577.279566][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 577.288518][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 577.296892][ T1604] bridge0: port 1(bridge_slave_0) entered blocking state [ 577.303950][ T1604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 577.311366][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 577.319987][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 577.328479][ T1604] bridge0: port 2(bridge_slave_1) entered blocking state [ 577.335619][ T1604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 577.365340][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 577.373855][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 577.382392][ T1604] bridge0: port 1(bridge_slave_0) entered blocking state [ 577.389781][ T1604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 577.398453][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 577.407170][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 577.415535][ T1604] bridge0: port 2(bridge_slave_1) entered blocking state [ 577.422665][ T1604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 577.430819][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 577.439187][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 577.447654][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 577.456149][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 577.464529][ T1604] bridge0: port 1(bridge_slave_0) entered blocking state [ 577.471849][ T1604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 577.479565][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 577.487187][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 577.495407][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 577.503795][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 577.512332][ T1604] bridge0: port 2(bridge_slave_1) entered blocking state [ 577.519390][ T1604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 577.526886][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 577.535401][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 577.543810][ T1604] bridge0: port 1(bridge_slave_0) entered blocking state [ 577.550961][ T1604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 577.558997][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 577.567887][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 577.576290][ T1604] bridge0: port 2(bridge_slave_1) entered blocking state [ 577.583477][ T1604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 577.590868][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 577.614550][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 577.622226][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 577.630271][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 577.639091][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 577.647808][ T1604] bridge0: port 1(bridge_slave_0) entered blocking state [ 577.655595][ T1604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 577.663134][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 577.671595][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 577.680065][ T1604] bridge0: port 2(bridge_slave_1) entered blocking state [ 577.687205][ T1604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 577.694905][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 577.703452][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 577.711438][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 577.719525][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 577.727945][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 577.736144][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 577.760168][T20865] device veth0_vlan entered promiscuous mode [ 577.768844][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 577.777227][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 577.786226][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 577.794753][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 577.802948][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 577.811372][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 577.820139][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 577.829031][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 577.837041][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 577.845342][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 577.853246][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 577.868785][T20865] device veth1_macvtap entered promiscuous mode [ 577.878312][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 577.888536][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 577.901456][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 577.910185][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 577.926606][T20866] device veth0_vlan entered promiscuous mode [ 577.938408][T20869] device veth0_vlan entered promiscuous mode [ 577.946808][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 577.955101][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 577.962454][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 577.970269][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 577.979668][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 577.989131][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 577.996822][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 578.014450][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 578.024112][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 578.032380][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 578.041807][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 578.060300][T20867] device veth0_vlan entered promiscuous mode [ 578.067847][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 578.076711][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 578.084334][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 578.092117][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 578.099861][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 578.107315][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 578.115963][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 578.124412][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 578.132757][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 578.142215][T20868] device veth0_vlan entered promiscuous mode [ 578.154213][T20866] device veth1_macvtap entered promiscuous mode [ 578.167637][T20869] device veth1_macvtap entered promiscuous mode [ 578.177316][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 578.189063][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 578.228427][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 578.237018][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 578.247317][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 578.256098][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 578.272120][T20868] device veth1_macvtap entered promiscuous mode [ 578.308013][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 578.316447][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 578.343568][T20867] device veth1_macvtap entered promiscuous mode [ 578.426172][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 578.434835][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 578.444953][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 578.460927][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 578.471189][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 578.481084][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 578.491450][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 578.500545][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 578.509387][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 578.519006][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 578.527696][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 578.539546][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 578.548661][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 579.018313][ T9913] : port 1(erspan0) entered disabled state [ 579.027554][ T9913] GPL: port 1(erspan0) entered disabled state [ 579.087579][ T9913] device erspan0 left promiscuous mode [ 579.096929][ T9913] : port 1(erspan0) entered disabled state [ 579.126208][ T9913] device erspan0 left promiscuous mode [ 579.137210][ T9913] GPL: port 1(erspan0) entered disabled state [ 579.570041][ T9913] device bridge_slave_1 left promiscuous mode [ 579.584702][ T9913] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.658696][ T9913] device bridge_slave_0 left promiscuous mode [ 579.737822][ T9913] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.784567][ T9913] device bridge_slave_1 left promiscuous mode [ 579.791028][ T9913] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.799201][ T9913] device bridge_slave_0 left promiscuous mode [ 579.805383][ T9913] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.823121][ T9913] device bridge_slave_1 left promiscuous mode [ 579.829669][ T9913] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.837618][ T9913] device bridge_slave_0 left promiscuous mode [ 579.844001][ T9913] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.874395][ T9913] device veth1_macvtap left promiscuous mode [ 579.881381][ T9913] device veth1_macvtap left promiscuous mode [ 579.888466][ T9913] device veth0_vlan left promiscuous mode [ 580.440894][T20981] device wg2 entered promiscuous mode [ 580.465356][T20982] device syzkaller0 entered promiscuous mode [ 580.816257][ T94] udevd[94]: worker [20068] terminated by signal 33 (Unknown signal 33) [ 580.861028][ T94] udevd[94]: worker [20068] failed while handling '/devices/virtual/block/loop5' [ 582.077750][T21065] device veth1_macvtap left promiscuous mode [ 583.978276][T21130] device syzkaller0 entered promiscuous mode [ 584.041550][T21135] dvmrp1: tun_chr_ioctl cmd 2147767511 [ 584.051881][T21135] dvmrp1: tun_chr_ioctl cmd 1074812118 [ 584.075129][T21135] dvmrp1: tun_chr_ioctl cmd 35092 [ 584.419175][T21171] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.426513][T21171] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.503229][T21176] device bridge_slave_1 left promiscuous mode [ 584.509731][T21176] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.575591][T21176] device bridge_slave_0 left promiscuous mode [ 584.593487][T21176] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.843140][T21182] device syzkaller0 entered promiscuous mode [ 588.020670][T21254] device syzkaller0 entered promiscuous mode [ 588.138644][T21250] device wg2 entered promiscuous mode [ 598.306112][T21408] device wg2 left promiscuous mode [ 598.330379][T21407] device wg2 entered promiscuous mode [ 598.885565][T21416] device syzkaller0 entered promiscuous mode [ 599.404475][T21464] device wg2 left promiscuous mode [ 599.561513][T21472] device wg2 entered promiscuous mode [ 600.564950][T21528] syz.6.6018[21528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 601.446593][T21549] pimreg: tun_chr_ioctl cmd 1074025677 [ 601.523901][T21549] pimreg: linktype set to 6 [ 602.706599][T21598] device syzkaller0 entered promiscuous mode [ 603.583363][T21630] device syzkaller0 entered promiscuous mode [ 603.657241][T21643] device syzkaller0 entered promiscuous mode [ 603.929595][T21674] device pim6reg1 entered promiscuous mode [ 604.027835][T21686] device veth0_vlan left promiscuous mode [ 604.034094][T21686] device veth0_vlan entered promiscuous mode [ 604.044442][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 604.061034][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 604.073606][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 604.185955][T21694] џџџџџџ: renamed from vlan1 [ 604.324269][T21707] GPL: port 1(erspan0) entered blocking state [ 604.330655][T21707] GPL: port 1(erspan0) entered disabled state [ 604.379235][T21707] device erspan0 entered promiscuous mode [ 604.468383][T21723] GPL: port 1(erspan0) entered blocking state [ 604.474803][T21723] GPL: port 1(erspan0) entered forwarding state [ 605.251534][T21751] device syzkaller0 entered promiscuous mode [ 605.312788][T21754] device veth0_vlan left promiscuous mode [ 605.331381][T21754] device veth0_vlan entered promiscuous mode [ 606.210128][T21793] Т: renamed from pim6reg1 [ 606.708432][ T24] audit: type=1400 audit(1758239389.040:174): avc: denied { create } for pid=21822 comm="syz.6.6117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 607.755109][T21867] device wg2 entered promiscuous mode [ 607.990905][T21880] device pim6reg1 entered promiscuous mode [ 608.382512][T21909] device syzkaller0 entered promiscuous mode [ 608.543207][T21917] device wg2 entered promiscuous mode [ 609.185073][T21975] device veth0_vlan left promiscuous mode [ 609.191582][T21975] device veth0_vlan entered promiscuous mode [ 609.364663][T21983] tap0: tun_chr_ioctl cmd 35108 [ 609.631403][T22001] device veth0_vlan left promiscuous mode [ 609.648975][T22001] device veth0_vlan entered promiscuous mode [ 609.749129][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 609.807427][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 609.866320][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 610.168343][T22028] device pim6reg1 entered promiscuous mode [ 610.512577][T22041] device syzkaller0 entered promiscuous mode [ 610.559481][T22046] tap0: tun_chr_ioctl cmd 1074025677 [ 610.603796][T22046] tap0: linktype set to 23 [ 610.752829][T22054] device wg2 left promiscuous mode [ 610.812669][T22054] device wg2 entered promiscuous mode [ 610.894726][T22061] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 610.968837][T22061] device syzkaller0 entered promiscuous mode [ 611.803197][T22095] device veth0_vlan left promiscuous mode [ 611.869071][T22095] device veth0_vlan entered promiscuous mode [ 616.360505][T22294] device syzkaller0 entered promiscuous mode [ 616.513472][T22343] device syzkaller0 entered promiscuous mode [ 616.819133][T22369] device syzkaller0 entered promiscuous mode [ 617.055999][T22387] Б: renamed from pim6reg1 [ 617.344950][T22389] device veth1_macvtap entered promiscuous mode [ 617.363476][T22389] device macsec0 entered promiscuous mode [ 617.409468][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 617.588093][T22402] syz.6.6282[22402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 617.588191][T22402] syz.6.6282[22402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 617.914233][T22411] device veth0_vlan left promiscuous mode [ 617.958769][T22411] device veth0_vlan entered promiscuous mode [ 618.171243][T22433] device sit0 entered promiscuous mode [ 618.711800][T22457] device syzkaller0 entered promiscuous mode [ 620.200554][T22506] tap0: tun_chr_ioctl cmd 1074025677 [ 620.210670][T22506] tap0: linktype set to 825 [ 620.257726][T22510] device veth1_macvtap left promiscuous mode [ 620.434018][T22519] device veth0_vlan left promiscuous mode [ 620.454193][T22519] device veth0_vlan entered promiscuous mode [ 620.596623][T22526] device syzkaller0 entered promiscuous mode [ 621.179166][T22556] device syzkaller0 entered promiscuous mode [ 621.747139][T22619] device syzkaller0 entered promiscuous mode [ 622.298180][T22645] device syzkaller0 entered promiscuous mode [ 622.562708][ T24] audit: type=1400 audit(1758239404.890:175): avc: denied { attach_queue } for pid=22658 comm="syz.6.6358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 622.719952][T22661] device veth0_vlan left promiscuous mode [ 622.746237][T22661] device veth0_vlan entered promiscuous mode [ 623.303326][T22685] A6Бџ: renamed from team_slave_1 [ 623.867427][T22717] device syzkaller0 entered promiscuous mode [ 625.974360][T22786] device wg2 left promiscuous mode [ 626.014191][T22793] device wg2 entered promiscuous mode [ 626.149664][T22798] device pim6reg1 entered promiscuous mode [ 626.449856][T22818] syz.9.6402[22818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 626.458094][T22818] syz.9.6402[22818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 626.503298][T22819] syz.9.6402[22819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 627.498583][T22887] device syzkaller0 entered promiscuous mode [ 627.807167][T22915] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.814544][T22915] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.867827][T22909] device syzkaller0 entered promiscuous mode [ 627.926238][T22931] device sit0 entered promiscuous mode [ 628.095278][T22940] device syzkaller0 entered promiscuous mode [ 628.855467][T22981] device pim6reg1 entered promiscuous mode [ 632.356986][T23188] device syzkaller0 entered promiscuous mode [ 633.542840][T23245] syz.7.6524[23245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 633.542943][T23245] syz.7.6524[23245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 633.768964][T23253] device syzkaller0 entered promiscuous mode [ 633.965265][T23267] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.972752][T23267] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.030225][T23267] device bridge_slave_1 left promiscuous mode [ 634.050412][T23267] bridge0: port 2(bridge_slave_1) entered disabled state [ 634.074858][T23267] device bridge_slave_0 left promiscuous mode [ 634.081282][T23267] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.484452][T23302] device wg2 left promiscuous mode [ 634.805599][T23319] device pim6reg1 entered promiscuous mode [ 634.847430][T23336] device wg2 left promiscuous mode [ 635.098926][T23348] device wg2 entered promiscuous mode [ 635.977618][T23381] device syzkaller0 entered promiscuous mode [ 638.856208][T23434] syz.7.6577[23434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.857291][T23434] syz.7.6577[23434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 639.733880][T23485] device wg2 left promiscuous mode [ 639.954115][T23497] device pim6reg1 entered promiscuous mode [ 641.514408][T23572] device veth1_macvtap left promiscuous mode [ 641.774980][T23598] device wg2 left promiscuous mode [ 641.798552][T23598] syz.9.6623[23598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.798609][T23598] syz.9.6623[23598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.929293][T23598] device wg2 entered promiscuous mode [ 642.082741][T23611] syz.5.6629[23611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.082822][T23611] syz.5.6629[23611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.194219][T23618] џџџџџџ: renamed from vlan1 [ 642.566468][T23655] џ: renamed from bond_slave_0 [ 642.695273][T23661] device veth1_macvtap left promiscuous mode [ 642.701797][T23661] device macsec0 left promiscuous mode [ 642.710572][T23661] device veth1_macvtap entered promiscuous mode [ 642.717602][T23661] device macsec0 entered promiscuous mode [ 643.100983][T23698] device veth1_macvtap left promiscuous mode [ 644.711687][T23783] џџџџџџ: renamed from vlan1 [ 645.067893][T23801] device sit0 entered promiscuous mode [ 645.341889][T23818] device pim6reg1 entered promiscuous mode [ 647.622178][T23947] device wg2 entered promiscuous mode [ 647.734187][T23956] device veth1_macvtap left promiscuous mode [ 648.148836][T23998] device sit0 entered promiscuous mode [ 648.350276][T24011] device veth0_vlan left promiscuous mode [ 648.365565][T24011] device veth0_vlan entered promiscuous mode [ 648.399299][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 648.446527][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 648.464866][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 648.598767][T24028] device syzkaller0 entered promiscuous mode [ 649.553665][T24098] syz.6.6770[24098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 649.553755][T24098] syz.6.6770[24098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 649.738997][T24112] bridge0: port 2(bridge_slave_1) entered disabled state [ 649.759418][T24112] bridge0: port 1(bridge_slave_0) entered disabled state [ 649.845272][T24115] device bridge_slave_1 left promiscuous mode [ 649.857481][T24115] bridge0: port 2(bridge_slave_1) entered disabled state [ 649.871885][T24115] device bridge_slave_0 left promiscuous mode [ 649.883174][T24115] bridge0: port 1(bridge_slave_0) entered disabled state [ 650.161597][T24124] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 650.198238][T24124] device syzkaller0 entered promiscuous mode [ 651.149831][T24181] device veth0_vlan left promiscuous mode [ 651.181291][T24181] device veth0_vlan entered promiscuous mode [ 651.205792][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 651.216454][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 651.270438][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 651.700732][T24204] syz.5.6799[24204] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 651.700787][T24204] syz.5.6799[24204] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 651.753269][T24204] device pim6reg1 entered promiscuous mode [ 652.606906][T24291] device syzkaller0 entered promiscuous mode [ 653.304260][T24312] device pim6reg1 entered promiscuous mode [ 653.354727][T24317] device syzkaller0 entered promiscuous mode [ 656.612886][T24383] device syzkaller0 entered promiscuous mode [ 657.287640][T24452] device veth0_vlan left promiscuous mode [ 657.306992][T24452] device veth0_vlan entered promiscuous mode [ 657.336981][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 657.374943][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 657.391231][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 657.462542][T24472] @0й: renamed from bond_slave_1 [ 657.591346][T24483] device syzkaller0 entered promiscuous mode [ 659.724855][T24545] device syzkaller0 entered promiscuous mode [ 660.110500][T24569] device pim6reg1 entered promiscuous mode [ 661.233863][T24628] device macsec0 entered promiscuous mode [ 661.382418][T24633] device syzkaller0 entered promiscuous mode [ 663.759271][T24721] device syzkaller0 entered promiscuous mode [ 665.622000][T24766] tap0: tun_chr_ioctl cmd 1074025675 [ 665.628768][T24766] tap0: persist enabled [ 665.633483][T24766] tap0: tun_chr_ioctl cmd 1074025675 [ 665.639016][T24766] tap0: persist enabled [ 668.335460][T24908] device sit0 left promiscuous mode [ 668.679465][T24916] device pim6reg1 entered promiscuous mode [ 669.095858][T24946] device veth0_vlan left promiscuous mode [ 669.108199][T24946] device veth0_vlan entered promiscuous mode [ 669.157685][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 669.168915][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 669.193452][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 669.337211][T24995] device pim6reg1 entered promiscuous mode [ 669.361738][T24999] syz.6.7013[24999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 669.361812][T24999] syz.6.7013[24999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 669.461228][T24994] device syzkaller0 entered promiscuous mode [ 669.577833][T25009] syz.8.7017[25009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 669.577893][T25009] syz.8.7017[25009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 669.854845][T25034] device macsec0 entered promiscuous mode [ 670.727762][T25093] syz.7.7041[25093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 670.727844][T25093] syz.7.7041[25093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 670.967503][T25117] device wg2 entered promiscuous mode [ 671.544053][T25140] device veth0_vlan left promiscuous mode [ 671.554663][T25140] device veth0_vlan entered promiscuous mode [ 672.095414][T25175] device pim6reg1 entered promiscuous mode [ 672.556196][T25181] device syzkaller0 entered promiscuous mode [ 673.629495][T25258] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 673.659363][T25258] device syzkaller0 entered promiscuous mode [ 674.069286][T25299] device syzkaller0 entered promiscuous mode [ 674.091391][T25299] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 674.171200][T25306] device sit0 left promiscuous mode [ 674.221197][T25306] device sit0 entered promiscuous mode [ 674.288113][T25321] device wg2 left promiscuous mode [ 674.330284][T25321] device wg2 entered promiscuous mode [ 674.694158][T25344] -1: renamed from syzkaller0 [ 675.315929][T25382] device wg2 left promiscuous mode [ 675.383422][T25382] device wg2 entered promiscuous mode [ 675.430279][T25389] syz.9.7127[25389] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.430319][T25389] syz.9.7127[25389] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.469030][T25390] syz.9.7127[25390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.854314][T25499] device syzkaller0 entered promiscuous mode [ 677.563426][T25535] device syzkaller0 entered promiscuous mode [ 677.882422][T25560] device syzkaller0 entered promiscuous mode [ 679.097134][T25617] device pim6reg1 entered promiscuous mode [ 680.940023][T25715] device pim6reg1 entered promiscuous mode [ 680.981262][T25719] device sit0 left promiscuous mode [ 681.128124][T25721] device sit0 entered promiscuous mode [ 681.838206][T25769] device syzkaller0 entered promiscuous mode [ 682.055261][T25787] device veth0_vlan left promiscuous mode [ 682.062319][T25787] device veth0_vlan entered promiscuous mode [ 682.077642][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 682.088311][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 682.099157][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 682.194292][T25788] device veth1_macvtap entered promiscuous mode [ 682.505422][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 682.950200][T25826] device syzkaller0 entered promiscuous mode [ 683.188437][T25844] device syzkaller0 entered promiscuous mode [ 683.582167][T25895] device wg2 left promiscuous mode [ 683.588273][T25892] device pim6reg1 entered promiscuous mode [ 683.635259][T25881] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 683.642245][T25895] device wg2 entered promiscuous mode [ 684.220188][T25944] device dummy0 entered promiscuous mode [ 684.248380][T25942] device pim6reg1 entered promiscuous mode [ 684.311804][T25948] device syzkaller0 entered promiscuous mode [ 684.583880][T25961] device pim6reg1 entered promiscuous mode [ 684.883087][T25982] device pim6reg1 entered promiscuous mode [ 685.368663][T26016] ЊЊЊЊЊЊ: renamed from vlan0 [ 686.550189][T26118] device syzkaller0 entered promiscuous mode [ 687.593941][T26231] device sit0 left promiscuous mode [ 687.662506][T26233] device sit0 entered promiscuous mode [ 687.871436][T26244] device syzkaller0 entered promiscuous mode [ 689.261560][T26352] device pim6reg1 entered promiscuous mode [ 689.550809][T26361] device syzkaller0 entered promiscuous mode [ 689.713692][T26387] device wg2 entered promiscuous mode [ 689.766593][T26395] Ÿы: port 1(veth0_vlan) entered blocking state [ 689.773189][T26395] Ÿы: port 1(veth0_vlan) entered disabled state [ 689.780796][T26389] device sit0 left promiscuous mode [ 689.788253][T26392] syz.9.7420[26392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 689.788332][T26392] syz.9.7420[26392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 689.828568][T26389] device sit0 entered promiscuous mode [ 689.853413][T26391] syz.9.7420[26391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 689.853519][T26391] syz.9.7420[26391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 689.885890][T26391] syz.9.7420[26391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 690.303952][T26426] device veth0_vlan left promiscuous mode [ 690.330326][T26426] device veth0_vlan entered promiscuous mode [ 690.365813][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 690.375847][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 690.384228][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 691.375099][T26476] device syzkaller0 entered promiscuous mode [ 691.587576][T26506] device syzkaller0 entered promiscuous mode [ 691.897592][T26519] syz.5.7461[26519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 691.898951][T26519] syz.5.7461[26519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 691.987144][T26522] device syzkaller0 entered promiscuous mode [ 692.103240][T26526] device pim6reg1 entered promiscuous mode [ 693.241635][T26555] device pim6reg1 entered promiscuous mode [ 693.943570][T26581] device wg2 left promiscuous mode [ 694.034922][T26581] device veth1_to_team entered promiscuous mode [ 694.118339][T26581] device wg2 entered promiscuous mode [ 694.170478][T26601] syz.8.7483[26601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.170536][T26601] syz.8.7483[26601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 695.759851][T26702] device syzkaller0 entered promiscuous mode [ 697.287559][T26774] syz.8.7534[26774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 697.287617][T26774] syz.8.7534[26774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 697.402549][T26785] device sit0 entered promiscuous mode [ 697.446437][ T24] audit: type=1400 audit(1758239479.780:176): avc: denied { create } for pid=26771 comm="syz.5.7532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 698.399201][T26845] device pim6reg1 entered promiscuous mode [ 699.305268][T26871] device syzkaller0 entered promiscuous mode [ 699.930637][T26906] device syzkaller0 entered promiscuous mode [ 701.878344][T26992] device macsec0 entered promiscuous mode [ 702.405290][T27009] device syzkaller0 entered promiscuous mode [ 704.621115][T27170] device sit0 left promiscuous mode [ 704.746005][T27170] device sit0 entered promiscuous mode [ 704.794211][T27176] device pim6reg1 entered promiscuous mode [ 704.902368][T27181] device wg2 left promiscuous mode [ 704.963947][T27181] device wg2 entered promiscuous mode [ 705.976069][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 706.055702][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 706.117775][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 706.129308][T27220] device pim6reg1 entered promiscuous mode [ 706.139492][T27222] device veth0_vlan left promiscuous mode [ 706.156373][T27222] device veth0_vlan entered promiscuous mode [ 706.214193][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 706.226904][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 706.244746][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 707.304716][T27284] device pim6reg1 entered promiscuous mode [ 707.441571][T27299] device syzkaller0 entered promiscuous mode [ 707.535776][T27304] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 707.541952][T27305] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 707.556141][T27305] syzkaller0: linktype set to 804 [ 707.572655][T27304] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 708.474389][T27359] device sit0 left promiscuous mode [ 708.562898][T27371] device wg2 left promiscuous mode [ 708.574525][T27369] device macsec0 left promiscuous mode [ 708.602109][T27371] device wg2 entered promiscuous mode [ 708.619323][T27373] device pim6reg1 entered promiscuous mode [ 709.641003][T27450] syz.9.7735[27450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 709.641097][T27450] syz.9.7735[27450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 710.170279][T27473] device syzkaller0 entered promiscuous mode [ 710.753084][T27544] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 710.832561][T27528] device syzkaller0 entered promiscuous mode [ 712.327896][T27652] device sit0 left promiscuous mode [ 712.430848][T27656] device sit0 entered promiscuous mode [ 712.613156][T27662] device pim6reg1 entered promiscuous mode [ 712.939056][T27697] device macsec0 entered promiscuous mode [ 713.550658][ T5484] syzkaller0: tun_net_xmit 76 [ 713.557828][ T5484] syzkaller0: tun_net_xmit 48 [ 714.678002][T27798] device wg2 left promiscuous mode [ 714.723654][T27809] device wg2 entered promiscuous mode [ 714.907303][T27811] device syzkaller0 entered promiscuous mode [ 715.636022][T27831] device syzkaller0 entered promiscuous mode [ 723.910649][T27884] device wg2 left promiscuous mode [ 723.942815][T27886] device pim6reg1 entered promiscuous mode [ 724.317107][ T24] audit: type=1400 audit(1758239506.420:177): avc: denied { setattr } for pid=27893 comm="syz.8.7859" path="pipe:[89500]" dev="pipefs" ino=89500 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 724.671750][T27924] device  entered promiscuous mode [ 727.577615][T28064] syz.6.7906[28064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 727.577676][T28064] syz.6.7906[28064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 727.590097][T28063] device wg2 left promiscuous mode [ 727.608940][T28064] syz.6.7906[28064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 727.608998][T28064] syz.6.7906[28064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 727.882211][T28080] џџџџџџ: renamed from vlan1 [ 732.247180][T28211] device pim6reg1 entered promiscuous mode [ 732.855369][T28245] device sit0 entered promiscuous mode [ 735.574825][T28381] device pim6reg1 entered promiscuous mode [ 735.698868][T28399] device syzkaller0 entered promiscuous mode [ 735.831237][T28411] device wg2 left promiscuous mode [ 735.940311][T28417] device syzkaller0 entered promiscuous mode [ 736.571033][T28443] 7B’чїя: renamed from syzkaller0 [ 736.724543][T28451] device pim6reg1 entered promiscuous mode [ 736.938770][T28482] device pim6reg1 entered promiscuous mode [ 737.183543][T28485] device syzkaller0 entered promiscuous mode [ 737.398577][T28518] device macsec0 left promiscuous mode [ 737.427837][T28518] device veth1_macvtap entered promiscuous mode [ 737.473151][T28518] device macsec0 entered promiscuous mode [ 737.491901][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 737.693756][T28534] syz.7.8041[28534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 737.693837][T28534] syz.7.8041[28534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 738.639634][T28570] device syzkaller0 entered promiscuous mode [ 739.106171][T28591] syz.9.8056[28591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 739.106233][T28591] syz.9.8056[28591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 739.135467][T28597] ip6_tunnel: non-ECT from fefd:000e:4000:0200:875a:6596:9ff5:7b00 with DS=0x31 [ 739.341549][T28612] device syzkaller0 entered promiscuous mode [ 740.415465][T28680] device pim6reg1 entered promiscuous mode [ 744.121382][T28796] tun0: tun_chr_ioctl cmd 35108 [ 744.126703][T28796] tun0: tun_chr_ioctl cmd 1074025681 [ 747.708102][T28995] device sit0 left promiscuous mode [ 747.809640][T28996] device sit0 entered promiscuous mode [ 748.619504][T29032] device wg2 entered promiscuous mode [ 748.661642][T29032] device sit0 left promiscuous mode [ 748.777825][T29032] device sit0 entered promiscuous mode [ 749.953490][T29104] device wg2 left promiscuous mode [ 750.014317][T29108] device wg2 entered promiscuous mode [ 752.214316][T29250] device syzkaller0 entered promiscuous mode [ 752.254993][T29252] syz.6.8247[29252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 752.255059][T29252] syz.6.8247[29252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 752.885166][T29269] device syzkaller0 entered promiscuous mode [ 753.702883][T29351] QБ6уз\b‹ЁY­4: renamed from lo [ 757.199131][T29568] syz.5.8337[29568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 757.199209][T29568] syz.5.8337[29568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 757.491919][T29577] device veth0_vlan left promiscuous mode [ 757.575040][T29577] device veth0_vlan entered promiscuous mode [ 757.604998][T29608] device macsec0 entered promiscuous mode [ 757.619512][T29617] device sit0 left promiscuous mode [ 758.849027][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 758.925034][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 759.009201][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 759.619432][T29728] device sit0 left promiscuous mode [ 759.959654][T29750] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 760.030439][T29750] device syzkaller0 entered promiscuous mode [ 760.037424][T29762] syz.5.8389[29762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 760.037524][T29762] syz.5.8389[29762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 760.063393][T29759] syz.5.8389[29759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 760.153203][T29759] syz.5.8389[29759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 760.967451][T29822] syz.9.8408[29822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.022101][T29823] syz.9.8408[29823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.044649][T29822] syz.9.8408[29822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.086629][T29833] p: renamed from pim6reg1 [ 762.913066][T29975] device pim6reg1 entered promiscuous mode [ 763.499890][T30018] device syzkaller0 entered promiscuous mode [ 763.860396][T30045] device macsec0 left promiscuous mode [ 763.879230][T30053] device veth1_macvtap entered promiscuous mode [ 763.890683][T30053] device macsec0 entered promiscuous mode [ 763.907683][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 763.958370][T30060] device sit0 left promiscuous mode [ 764.527963][T30114] device syzkaller0 entered promiscuous mode [ 764.610823][T30126] bridge0: port 2(bridge_slave_1) entered blocking state [ 764.618121][T30126] bridge0: port 2(bridge_slave_1) entered forwarding state [ 764.625814][T30126] bridge0: port 1(bridge_slave_0) entered blocking state [ 764.633435][T30126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 764.663270][T30126] device bridge0 entered promiscuous mode [ 765.413103][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 765.539204][T30183] device syzkaller0 entered promiscuous mode [ 765.737127][ T24] audit: type=1400 audit(1758239548.070:178): avc: denied { create } for pid=30201 comm="syz.8.8515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 765.769747][T30202] device pim6reg1 entered promiscuous mode [ 765.840449][T30217] device pim6reg1 entered promiscuous mode [ 766.246366][T30256] device pim6reg1 entered promiscuous mode [ 769.981674][T30439] p: renamed from pim6reg1 [ 770.100616][T30442] device sit0 entered promiscuous mode [ 770.319097][T30463] device sit0 left promiscuous mode [ 770.911639][T30495] device syzkaller0 entered promiscuous mode [ 770.975836][T30501] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 770.982091][T30501] syzkaller0: Linktype set failed because interface is up [ 771.703109][T30537] bridge0: port 2(bridge_slave_1) entered disabled state [ 771.712485][T30537] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.694557][T30641] syz.7.8641[30641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 773.694629][T30641] syz.7.8641[30641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 784.746092][T30705] geneve1: tun_chr_ioctl cmd 1074025672 [ 784.847622][T30705] geneve1: ignored: set checksum enabled [ 784.937280][T30712] device pim6reg1 entered promiscuous mode [ 785.050573][T30720] syz.6.8656[30720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 785.051758][T30720] syz.6.8656[30720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 785.612528][T30751] device syzkaller0 entered promiscuous mode [ 785.802432][T30763] device pim6reg1 entered promiscuous mode [ 787.192059][T30866] tap0: tun_chr_ioctl cmd 1074025677 [ 787.197686][T30866] tap0: linktype set to 774 [ 787.973836][T30901] device wg2 left promiscuous mode [ 789.287384][T30977] device syzkaller0 entered promiscuous mode [ 789.505379][T30996] tap1: tun_chr_ioctl cmd 1074025680 [ 789.516670][T30980] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.582986][T30980] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.591189][T30980] device bridge_slave_0 entered promiscuous mode [ 790.206135][ T306] GPL: port 1(erspan0) entered disabled state [ 790.233661][ T306] device erspan0 left promiscuous mode [ 790.239380][ T306] GPL: port 1(erspan0) entered disabled state [ 790.454488][ T306] device bridge_slave_1 left promiscuous mode [ 790.460742][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 790.483380][ T306] device bridge_slave_0 left promiscuous mode [ 790.489860][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 790.613814][ T306] device veth1_macvtap left promiscuous mode [ 804.083555][T30980] bridge0: port 2(bridge_slave_1) entered blocking state [ 804.090895][T30980] bridge0: port 2(bridge_slave_1) entered disabled state [ 804.128147][T30980] device bridge_slave_1 entered promiscuous mode [ 804.527323][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 804.535341][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 804.575441][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 804.584295][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 804.593611][ T9913] bridge0: port 1(bridge_slave_0) entered blocking state [ 804.600791][ T9913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 804.687232][T31022] bridge0: port 1(bridge_slave_0) entered blocking state [ 804.703117][T31022] bridge0: port 1(bridge_slave_0) entered disabled state [ 804.710864][T31022] device bridge_slave_0 entered promiscuous mode [ 804.733533][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 804.794689][T31022] bridge0: port 2(bridge_slave_1) entered blocking state [ 804.806784][T31022] bridge0: port 2(bridge_slave_1) entered disabled state [ 804.816720][T31022] device bridge_slave_1 entered promiscuous mode [ 804.875040][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 804.883614][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 804.891860][ T9913] bridge0: port 2(bridge_slave_1) entered blocking state [ 804.898912][ T9913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 805.007531][T31027] bridge0: port 1(bridge_slave_0) entered blocking state [ 805.014852][T31027] bridge0: port 1(bridge_slave_0) entered disabled state [ 805.022815][T31027] device bridge_slave_0 entered promiscuous mode [ 805.047385][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 805.073608][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 805.081888][T31027] bridge0: port 2(bridge_slave_1) entered blocking state [ 805.093888][T31027] bridge0: port 2(bridge_slave_1) entered disabled state [ 805.101718][T31027] device bridge_slave_1 entered promiscuous mode [ 805.117370][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 805.160075][T30980] device veth0_vlan entered promiscuous mode [ 805.215337][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 805.227426][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 805.235982][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 805.243985][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 805.312244][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 805.320512][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 805.353925][T30980] device veth1_macvtap entered promiscuous mode [ 805.390744][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 805.399437][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 805.407878][ T9913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 805.424555][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 805.434093][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 805.526074][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 805.545081][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 805.617577][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 805.626569][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 805.635715][ T1604] bridge0: port 1(bridge_slave_0) entered blocking state [ 805.642853][ T1604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 805.652168][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 805.661745][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 805.671453][ T1604] bridge0: port 2(bridge_slave_1) entered blocking state [ 805.678636][ T1604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 805.687271][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 805.695123][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 805.702764][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 805.711650][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 805.720509][ T1604] bridge0: port 1(bridge_slave_0) entered blocking state [ 805.727749][ T1604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 805.736347][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 805.745080][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 805.753838][ T1604] bridge0: port 2(bridge_slave_1) entered blocking state [ 805.761429][ T1604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 805.773589][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 805.781571][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 805.789710][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 805.919396][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 805.930919][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 805.941334][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 805.950837][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 805.963083][T31063] device pim6reg1 entered promiscuous mode [ 806.087583][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 806.095955][T31022] device veth0_vlan entered promiscuous mode [ 806.149825][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 806.163971][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 806.189326][T31022] device veth1_macvtap entered promiscuous mode [ 806.264733][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 806.273383][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 806.281766][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 806.290365][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 806.299265][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 806.312518][T31027] device veth0_vlan entered promiscuous mode [ 806.345731][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 806.355663][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 806.365102][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 806.381237][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 806.401248][T31027] device veth1_macvtap entered promiscuous mode [ 806.451025][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 806.460324][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 806.468339][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 806.477026][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 806.485641][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 806.493718][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 806.502421][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 806.552805][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 806.562137][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 806.604828][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 806.643631][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 807.049561][ T9913] device veth1_macvtap left promiscuous mode [ 807.514489][T31109] bridge0: port 1(bridge_slave_0) entered blocking state [ 807.527194][T31109] bridge0: port 1(bridge_slave_0) entered disabled state [ 807.543943][T31109] device bridge_slave_0 entered promiscuous mode [ 807.553772][T31109] bridge0: port 2(bridge_slave_1) entered blocking state [ 807.561004][T31109] bridge0: port 2(bridge_slave_1) entered disabled state [ 807.583454][T31109] device bridge_slave_1 entered promiscuous mode [ 807.827404][T31109] bridge0: port 2(bridge_slave_1) entered blocking state [ 807.834706][T31109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 807.842165][T31109] bridge0: port 1(bridge_slave_0) entered blocking state [ 807.849555][T31109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 808.528362][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 808.543980][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 808.552778][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 808.603160][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 808.640152][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 808.673404][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 808.682251][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 808.730230][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 808.814924][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 808.889167][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 808.943202][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 808.999917][T31109] device veth0_vlan entered promiscuous mode [ 809.016854][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 809.025648][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 809.141023][T30178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 809.153394][T30178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 809.300832][T31109] device veth1_macvtap entered promiscuous mode [ 809.317239][T30178] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 809.339415][T30178] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 809.349680][T30178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 809.373989][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 809.393841][ T1604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 809.721902][T31186] batadv0: tun_chr_ioctl cmd 2147767521 [ 809.727762][T31186] batadv0: tun_chr_ioctl cmd 1074025692 [ 810.423020][ T24] audit: type=1400 audit(1758239592.750:179): avc: denied { read } for pid=31201 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 810.590412][T31238] device syzkaller0 entered promiscuous mode Stopping sshd: stopped /usr/sbin/sshd (pid 186) OK Stopping crond: stopped /usr/sbin/crond (pid 179) OK [ 811.325232][T31273] device syzkaller0 entered promiscuous mode Stopping dhcpcd... stopped /sbin/dhcpcd (pid 133) [ 811.523662][ T24] audit: type=1400 audit(1758239593.860:180): avc: denied { search } for pid=31285 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 812.158701][ T24] audit: type=1400 audit(1758239594.490:181): avc: denied { create } for pid=31313 comm="syz.7.8818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 OK Stopping iptables: [ 812.259820][ T24] audit: type=1400 audit(1758239594.590:182): avc: denied { search } for pid=31322 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 812.288320][T31298] device syzkaller0 entered promiscuous mode [ 812.293167][ T24] audit: type=1400 audit(1758239594.590:183): avc: denied { write } for pid=31322 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 812.336100][ T24] audit: type=1400 audit(1758239594.590:184): avc: denied { add_name } for pid=31322 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 umount: can't remount debugfs read-only umount: can't remount t[ 812.394117][ T24] audit: type=1400 audit(1758239594.590:185): avc: denied { create } for pid=31322 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 mpfs read-only [ 812.417435][ T24] audit: type=1400 audit(1758239594.590:186): avc: denied { read open } for pid=31322 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=35324 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 812.447896][ T24] audit: type=1400 audit(1758239594.590:187): avc: denied { lock } for pid=31322 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=35324 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 umount: selinuxfs busy - remounted read-only [ 812.542556][T31333] syz.1.8821[31333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 812.542616][T31333] syz.1.8821[31333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 812.702043][T31314] device pim6reg1 entered promiscuous mode umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only Connection to 10.128.1.131 closed by remote host. umount: can't remount /dev/root read-only The system is going down NOW! Sent SIGTERM to all processes [ 812.818583][ T24] audit: type=1400 audit(1758239595.150:188): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[14165]" dev="pipefs" ino=14165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 acpid: exiting Sent SIGKILL to all processes Requesting system poweroff [ 814.934105][ T9913] device bridge_slave_1 left promiscuous mode [ 814.940443][ T9913] bridge0: port 2(bridge_slave_1) entered disabled state [ 814.942563][T31362] kvm: exiting hardware virtualization [ 814.953513][ T9913] device bridge_slave_0 left promiscuous mode [ 814.960088][ T9913] bridge0: port 1(bridge_slave_0) entered disabled state [ 814.960575][T31362] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 814.974583][ T9913] device bridge_slave_1 left promiscuous mode [ 814.975533][T31362] ACPI: Preparing to enter system sleep state S5 [ 814.981002][ T9913] bridge0: port 2(bridge_slave_1) entered disabled state [ 814.987550][T31362] reboot: Power down [ 814.999107][ T9913] device bridge_slave_0 left promiscuous mode [ 815.006556][ T9913] bridge0: port 1(bridge_slave_0) entered disabled state serialport: VM disconnected.