last executing test programs: 3m15.504072937s ago: executing program 32 (id=4457): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001ec0)={&(0x7f0000001c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x40000}]}}, &(0x7f0000001dc0)=""/219, 0x26, 0xdb, 0x1}, 0x28) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) 3m15.170257164s ago: executing program 33 (id=4460): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000001000000000000000000000850000005300000018010000207834b000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000a00ef00850000009b0000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x45) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 3m15.025228157s ago: executing program 34 (id=4469): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0xb, &(0x7f00000000c0)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x88}}]}, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/cgroup\x00') 2m10.948301722s ago: executing program 35 (id=5630): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x30}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@map=r0, 0x1d, 0x1, 0x0, &(0x7f00000002c0)=[0x0], 0x1, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0}, 0x40) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001080)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xe7cc, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@map=r5, r3, 0x38, 0xa, r2, @void, @value=r2, @void, @void, r4}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 2m10.903083473s ago: executing program 36 (id=5632): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000008020000000000000000000001050000018000000000000000010000850200000000000000010000000000000400000000da"], 0x0, 0x52}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000073114200000000008510000002000000b7000000428173959500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r3, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xd3, &(0x7f0000000400)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x18, 0x1e, &(0x7f0000000180)=ANY=[@ANYBLOB="db828000f8ffffffb7080000000000007b8af8ff00000000b7080000166000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="00e4ffffff000000b70500000800000085000000a5000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff07000085000035e0296f3684a58b0020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffffff8500000006000000"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0x7, &(0x7f0000000080)=""/7, 0x40f00, 0x2, '\x00', r4, 0x0, r2, 0x8, &(0x7f0000000700)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x0, 0x10, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000008c0)=[r1, r1, r1, r1, r1, r1, r1, 0xffffffffffffffff, r1], &(0x7f0000000a40)=[{0x2, 0x4, 0x8, 0x7}, {0x8, 0x3, 0xa, 0x3}], 0x10, 0xfffffffc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) close(r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r5) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r7}, &(0x7f0000000a00), &(0x7f0000000500)}, 0x20) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r9 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r9, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000800000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000009c0)='sched_switch\x00', r0}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0}, 0x94) 2m10.878208204s ago: executing program 37 (id=5634): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000280), 0x2, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd07c}, 0x94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000f0ffffffffff030000000035"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f2, &(0x7f0000000080)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03400000011763db10000000000000000500436bba11ca5b83296dc39ac2b04238db633e87df1de9885c1aadba12f87290f09cb597049b85caf50530afacc52e0fce88b28137e30678c455778122982dca41a3bb6cb89a084f86d7eab50276400083c615dee63021963f5babe252d8f4ee2d2040e869fe6649754590a2e4b8873c69308d7c0a5187ea47fc5ddc29ce052f25d7ac181a543ec9d8542f5c7f68a3da9d883e3b"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r7], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair(0x1f, 0x80008, 0xfffffffd, &(0x7f0000000180)) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110e22fff6) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x58, 0x5}, 0x0, 0x0, 0x0, 0xa, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYRES8=r4], &(0x7f0000000000)='GPL\x00', 0x6, 0x92, &(0x7f0000000680)=""/146, 0x0, 0x12, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}, 0x94) 52.466823496s ago: executing program 4 (id=6941): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) close(r0) (async) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x40, 0x0, 0x4, 0x0, 0x0, 0xfffffffdfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x8, 0x4, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x5, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r1, @ANYBLOB="e7ffffffffffffffb702000800"/25], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe800000000000"], 0xfdef) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r6 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x98, &(0x7f0000000500)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x93, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x80, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300)={0x0, r6}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x14, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r10, 0xffff0000, 0xe, 0x0, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x8, &(0x7f0000000980)=ANY=[@ANYBLOB="180000000000000000000004c0f10000", @ANYRES32, @ANYBLOB="0000000000000000180000000000000000000000070000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0x1010000}, 0x10}, 0x94) (async) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x5d}, 0x94) 52.244917565s ago: executing program 4 (id=6944): bpf$MAP_CREATE(0x0, &(0x7f00000011c0)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="e1ae", @ANYRES32=0x0, @ANYBLOB="df8e8dbaf13fdd9de67d2fe942cdd91329807e5be6d502202e27d6b46650ea926aa90003cb2997205bfa", @ANYBLOB="0000000000000000000000f4b0dafbefea16280025265c82900000000000000000"], 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe1, 0x0, 0x0, 0x0, 0x401}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="02000000000000000000000000000000000000008041a1865bd0e9509e987adc9084edeb7c0e3a5e955445961f957d2b6f4fdfe120135abbc4fe48b172e749848f6b922977e293", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0xffffffffffffff40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffc6e) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0100000001000000050008000100000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r3}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001100)={&(0x7f0000000180)='netlink_extack\x00', r4, 0x0, 0xfffffffffffffffb}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r8, &(0x7f0000001000)='tasks\x00', 0x2, 0x0) 52.226988646s ago: executing program 0 (id=6947): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000014c0)={&(0x7f0000001380)=@id={0x1e, 0x3, 0x2, {0x4e24, 0x3}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x8800) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='percpu_create_chunk\x00', r2}, 0x18) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r5, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000580)=[0x0], &(0x7f00000005c0)=[0x0], 0x0, 0x85, &(0x7f0000000600)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x58, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x14000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) (async) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, 0x0, 0xfffffe49) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) 52.203428447s ago: executing program 0 (id=6948): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000200)}, 0x10) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x8, 0x4, 0x4, 0x0, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x5}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xc, 0x7}, 0x4000, 0x2000000, 0x100000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) (async) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x8e3a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x144a8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r5, &(0x7f0000000980), 0x20000992) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x4040040) (async, rerun: 32) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRES64=r6, @ANYRESHEX=r3, @ANYRESHEX=r1], &(0x7f0000000240)='GPL\x00', 0x8898, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="1865000000000008000000006c0d0000183b000003800000000040000000000085100000010000009892f4ff010000fe"], &(0x7f0000000380)='GPL\x00', 0x2, 0xea, &(0x7f00000004c0)=""/234, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x2, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f00000008c0)=[{0x0, 0x5, 0x3, 0x5}, {0x1, 0x1, 0x1, 0x9}, {0x2, 0x2, 0x10, 0x1}, {0x3, 0x1, 0x2, 0xa}, {0x4, 0x1, 0x7, 0x6}, {0x5, 0x2, 0x9}, {0x5, 0x1, 0x7, 0x7}, {0x3, 0x4, 0x5, 0x6}, {0x5, 0x1, 0xd, 0x7}], 0x10, 0x1}, 0x94) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) (async) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0), 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x1b, 0x3, 0x40, 0x9, 0x10004, r0, 0xfffffffa, '\x00', 0x0, 0xffffffffffffffff, 0x40001, 0x3, 0x0, 0x0, @void, @value, @value=r4}, 0x50) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) 52.071221162s ago: executing program 0 (id=6951): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001340)={{0x1, 0xffffffffffffffff}, &(0x7f00000012c0), &(0x7f0000001300)='%-010d \x00'}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001380)={&(0x7f0000000000)="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", &(0x7f0000001000)=""/142, &(0x7f00000010c0)="db66f229e427ef8470fca13a7643b57e020f57fae0af5f6785bf0810f500bc408269666ce2e76c6947e6e52c3a7b4317481e7c37d227a11e32a4a1dc522e4f34628f764935dba22fed64b74d2f9217dff088423a04df6d18b04a14b35a428d122c7444428f6dee302190c4b770bf9b979eea6135a10500cc667465a8c6e3695c8e6b75c5a119251851de61e73b12c98640bde6334e97f1cffdab31158efe9487e33a74ddf6cd92c41c151ecb4deba40b67512be717e48f44ab3f1807767309cc4f7c934774a8b5f2ab096ffac040b1bf72e3cb5377b818bd4d110a00e9788c785c1f00e91995", &(0x7f00000011c0)="c74115f9e161776432746fc452b0cf8dd39037a1495870d71adf735b5c9dd766932f9a990c66d18076112423a084bbcf77f3218495ef3449aa42d5845c291cebaf17d8fe4e6cccf61b2dc94318114ecc3cde69ddf9dbfdf638818f1f1f4fd72759aaeaa50278f85e5a4e4860b9006de0d21d34304876bc95661b17e3bdf5a8389854f10d7c781ecea8431e848478a85f5df0fea542affa0064cac317bd2f61eb4cd75dfa3e7eacee1d5b78c8432fe33ca1936fe2e46fa8421f3f05b6259c7b0f25a510517dfa0ae55330f2d8bf23766dfdb27244b18a4af955a495ec552b09192e9c040cd11bf03b767075d50f4ffbed0b", 0xfffffffb, r0}, 0x38) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000013c0)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000001400)='blkio.throttle.read_iops_device\x00', 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001440), 0x100, 0x0) r4 = getpid() r5 = perf_event_open$cgroup(&(0x7f0000001500)={0x3, 0x80, 0x5, 0x5, 0x3, 0x11, 0x0, 0x8, 0x40000, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb17, 0x4, @perf_config_ext={0x2, 0x8}, 0x2, 0x100000000, 0x9c8, 0x1, 0x6, 0xa, 0x3, 0x0, 0xa, 0x0, 0xbbb}, r1, 0x10, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x27, 0x1, 0x0, 0x80, 0x0, 0x9, 0x1a005, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8a2, 0x4, @perf_config_ext={0x1, 0x8}, 0x1, 0x3, 0x77d, 0x4, 0x3, 0x3, 0x9, 0x0, 0x3, 0x0, 0x7}, r4, 0x0, r5, 0x8) write$cgroup_int(r2, &(0x7f0000001580)=0x7f, 0x12) write$cgroup_int(r2, &(0x7f00000015c0)=0x5, 0x12) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001600)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x50) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001680)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x1}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001900)={r0, 0x58, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001940)=0xffffffffffffffff, 0x4) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x12, &(0x7f0000001700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf3}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@map_val={0x18, 0xa, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x47}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000017c0)='GPL\x00', 0x101, 0x79, &(0x7f0000001800)=""/121, 0x41000, 0x3c, '\x00', r9, 0x0, r10, 0x8, &(0x7f0000001980)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f00000019c0)=[r0, r0, r0, r0, r0, r0], &(0x7f0000001a00)=[{0x3, 0x2, 0x9, 0x3}, {0x4, 0x2, 0x6, 0x7}, {0x0, 0x1, 0xa, 0x6}, {0x2, 0x4, 0x10, 0x3}, {0x4, 0x3, 0x7, 0xa}, {0x0, 0x5, 0x2, 0x4}, {0x2, 0x5, 0xd, 0x3}, {0x2, 0x4, 0x9}, {0x3, 0x4, 0x3, 0xb}], 0x10, 0x5}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001c80)={@cgroup=r11, 0x20, 0x1, 0x3, &(0x7f0000001b80)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000001bc0)=[0x0, 0x0], &(0x7f0000001c00)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d40)={r4, r6, 0x0, 0x1, &(0x7f0000001d00)='\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001cc0)={@cgroup=r1, r3, 0x22, 0x30, r11, @void, @void, @void, @value=r13, r12}, 0x20) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001d80)={'hsr0\x00', 0x200}) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000001dc0)=""/181) r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001f80)=0xffffffffffffffff, 0x4) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=@base={0x5, 0x8, 0xffffffff, 0xd6b, 0x0, r8, 0x6, '\x00', r9, 0xffffffffffffffff, 0x2, 0x5}, 0x50) r16 = bpf$ITER_CREATE(0x21, &(0x7f00000020c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000002180)={0x13, 0x7, &(0x7f0000001e80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r8}]}, &(0x7f0000001ec0)='syzkaller\x00', 0x8000, 0x43, &(0x7f0000001f00)=""/67, 0x41100, 0x20, '\x00', r9, @fallback=0xa, r14, 0x8, &(0x7f0000001fc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000002000)={0x0, 0xc, 0x9c, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000002100)=[r15, r8, r7, r0, r8, r0, r16, r8, r8, r7], &(0x7f0000002140)=[{0x4, 0x2, 0xe, 0xb}, {0x0, 0x3, 0x4, 0x4}], 0x10, 0x6}, 0x94) openat$cgroup_type(r16, &(0x7f0000002240), 0x2, 0x0) recvmsg$unix(r16, &(0x7f0000002580)={&(0x7f0000002280), 0x6e, &(0x7f0000002400)=[{&(0x7f0000002300)=""/112, 0x70}, {&(0x7f0000002380)=""/110, 0x6e}], 0x2, &(0x7f0000002440)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}, 0x40000000) perf_event_open$cgroup(&(0x7f0000002600)={0x1, 0x80, 0x7, 0x2, 0x8, 0xa, 0x0, 0x8000000000000001, 0x8000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000025c0), 0x5}, 0x1084, 0x9, 0x6, 0x3, 0x2239, 0x1000, 0x1, 0x0, 0x9}, r18, 0x8, 0xffffffffffffffff, 0x8) openat$cgroup_int(r20, &(0x7f0000002680)='io.max\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003900)={r19, 0x0, 0xb8, 0x8c, &(0x7f00000026c0)="b1fe5b3732e5895dc13300d899e8cac3b6349b34bb23a699bd96bf370f3acf41d23f7493a51aa1e5d0963479ea9eaf838aa33b9eaa176b226db551011437a1f83a77661b1d8bfed618179b0810140f79faa2a3a4392dfea3904bf57820cf116e915747e88cbc7788212bfac37ebbdda684c2ee297fa4fd39b229a073810bff26ba47095053296b65c702269d49d55bb1783b6056953459228972d2bb83a1a19c8e52efeba84f1b9f0c3f6ecca8c91f4016a8a85931b853e8", &(0x7f0000002780)=""/140, 0x7, 0x0, 0x1000, 0x96, &(0x7f0000002840)="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", &(0x7f0000003840)="8b03099c0e74d4181f5adec4953b65ee284156a4d1c4cd569f00e969f1c294137733833163dedec11c04b0fd1c505e076d3867daf84fc8f2f3da88ffd1781bc0bc242b20108e6f57b8dcbcc5755f63cdea1c35ba9125cb1c4742c72c66e22d680d1eefb3748c8dcb3b04346184ce2da7af592656fefa6054b2b3cfa7bebdc2e136f0da4c96d876b401f96a8bebe2eca644f09b59ed67", 0x1}, 0x50) perf_event_open(&(0x7f0000003980)={0x5, 0x80, 0x7, 0x9, 0xe7, 0x6, 0x0, 0x2, 0x251a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x10, 0x4, @perf_config_ext={0x2, 0x6}, 0x1, 0xe, 0x8, 0x5, 0x3, 0xa, 0x40a, 0x0, 0x2, 0x0, 0x1}, 0x0, 0x10, r17, 0x1) 51.947206067s ago: executing program 4 (id=6952): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x0, 0x5}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=r1], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r6 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r5}, 0x8) close(r6) perf_event_open$cgroup(&(0x7f0000000340)={0x1, 0x80, 0x6, 0x4, 0xa8, 0x7, 0x0, 0x9e, 0xa810, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000180), 0xd}, 0xc0, 0x7, 0x0, 0x7, 0x7, 0x7, 0x80, 0x0, 0xc6, 0x0, 0x200}, r6, 0xc, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x44}, 0x50) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r7, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) 51.87347164s ago: executing program 0 (id=6953): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10008810}, 0x101) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) (async, rerun: 32) close(r3) (rerun: 32) 51.61892144s ago: executing program 0 (id=6954): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x16, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f086dd47e0ffff00122c00", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socketpair(0x2, 0x80806, 0xbc07, &(0x7f0000001740)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x1}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r3, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000240)='%pS \x00'}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xffffffffffffffff, 0x10001}, 0x0, 0x4, 0x2, 0x4, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)={&(0x7f0000000080)=@abs={0x1}, 0x6e, 0x0}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r8, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r10, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{r3, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)='%pB \x00'}, 0x20) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)=@o_path={&(0x7f0000000740)='./file0\x00', 0x0, 0x10, r2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xe, 0x17, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@alu={0x4, 0x1, 0xd, 0x6, 0x4, 0xffffffffffffffe0, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_fd={0x18, 0x7, 0x1, 0x0, r3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x727, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000380)='syzkaller\x00', 0x6, 0x54, &(0x7f0000000440)=""/84, 0x41100, 0xe, '\x00', r9, @sk_skb=0x26, r8, 0x8, &(0x7f0000000540)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0xb, 0x101, 0x7ff}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f00000007c0)=[r3, r10, r3, r11, r5, r3, r8, r12, r3], &(0x7f0000000800), 0x10, 0xfffffffe}, 0x94) write$cgroup_subtree(r8, &(0x7f0000000800)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) openat$cgroup_type(r8, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f3, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0x36) 51.562479442s ago: executing program 4 (id=6957): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x1f}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r2 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000080)={'syz_tun', 0x32, 0x34}, 0xa) 51.460566607s ago: executing program 9 (id=6958): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x6, 0xc, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xef, 0x3, 0x0, 0x0, 0x0, 0x0, 0x28264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x2, @perf_config_ext={0x8000000001eb, 0x10001}, 0x2018, 0x0, 0x0, 0x2, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES64], 0x48) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000400), 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRES16=r0, @ANYRES32=r4, @ANYRESHEX=r1, @ANYRES64=r1, @ANYRES64=r3, @ANYRES8=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x9, 0xfffffffb, 0x4, 0x8, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x100}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRESOCT=r7], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r8}, &(0x7f0000000800), &(0x7f0000000840)=r9}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00'}, 0x10) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 51.459897707s ago: executing program 4 (id=6959): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x5, 0x7, 0x8, 0x5, 0x80}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000005c0)='kfree_skb\x00', r6}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r7}, 0x10) close(r3) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x384, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r8, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r9 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="110000000475ac57b368f9de448174ac070000ff0900fffffffffb000000fc0002411b271df095bca4fa4032900697fa67e7", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="0000000002000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 51.38463902s ago: executing program 1 (id=6961): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x4, 0x28}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3}, 0x18) socketpair(0x21, 0x2, 0x1000, &(0x7f00000030c0)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x18) syz_clone(0x40200400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x4, 0x28}, 0x50) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) (async) sendmsg$tipc(r1, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3}, 0x18) (async) socketpair(0x21, 0x2, 0x1000, &(0x7f00000030c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x18) (async) syz_clone(0x40200400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 51.290007033s ago: executing program 1 (id=6962): r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x10}, 0xc) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0x8, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_query]}, &(0x7f0000000100)='syzkaller\x00', 0x1, 0xfe, &(0x7f0000000140)=""/254, 0x41000, 0x4d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x8, 0xffff, 0x83}, 0x10, 0x11dd, 0xffffffffffffffff, 0x1, &(0x7f0000000340)=[r1, r2], &(0x7f0000000380)=[{0x3, 0x3, 0xe}], 0x10, 0x1}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000480)) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='dlm_recv\x00', r0, 0x0, 0xc5}, 0x18) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000540)={'vlan0\x00', @multicast}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r2, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800)=0xffffffffffffffff, 0x4) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0xb, &(0x7f0000000580)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1ff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}], &(0x7f0000000600)='syzkaller\x00', 0x7ff, 0xdb, &(0x7f0000000640)=""/219, 0x82200, 0x68, '\x00', r4, 0x0, r5, 0x8, &(0x7f0000000840)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x3, 0xd, 0x6, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000008c0)=[r1, r2, r1], &(0x7f0000000900)=[{0x5, 0x3, 0x5, 0x6}, {0x0, 0x3, 0x9, 0xc}, {0x2, 0x3, 0x1, 0x8}], 0x10, 0x2}, 0x94) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a00)={0x1b, 0x0, 0x0, 0x6d9, 0x0, r1, 0xf, '\x00', 0x0, r5, 0x5, 0x0, 0x3}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={r2, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000c00)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000c40)=[0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf5, &(0x7f0000000cc0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000d00), &(0x7f0000000d40), 0x8, 0x74, 0x8, 0x8, &(0x7f0000000d80)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0xd, 0x14, &(0x7f0000000a80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ldst={0x0, 0x2, 0x3, 0x9, 0xb, 0xffffffffffffffe8, 0x10}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @generic={0xd0, 0x1, 0x6, 0x865}, @jmp={0x5, 0x1, 0x7, 0xa, 0x5, 0x116, 0xfffffffffffffff0}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000b40)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x25, '\x00', r4, @sock_ops=0x3, r5, 0x8, &(0x7f0000000b80)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000bc0)={0x2, 0x8, 0x5, 0x5}, 0x10, r8, 0xffffffffffffffff, 0x6, &(0x7f0000000f00)=[r1], &(0x7f0000000f40)=[{0x3, 0x3, 0x2, 0x8}, {0x4, 0x5, 0x0, 0xb}, {0x0, 0x3, 0x3, 0x8}, {0x5, 0x2, 0x1, 0x8}, {0x4, 0x1, 0x6, 0x6}, {0x1, 0x1, 0x7, 0x6}], 0x10, 0x1}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001180)={@ifindex=r4, 0xb, 0x1, 0x7, &(0x7f0000001080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f00000010c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001100)=[0x0], &(0x7f0000001140)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000011c0)={@fallback=r3, 0xffffffffffffffff, 0x0, 0x18, 0x0, @void, @value=r2, @void, @void, r9}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001300)={@ifindex=r4, 0x1f, 0x1, 0x9fb, &(0x7f0000001200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000001240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001280)=[0x0], &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001380)={&(0x7f0000001340)='iocost_iocg_forgive_debt\x00', r6, 0x0, 0x7fffffff}, 0x18) r11 = bpf$ITER_CREATE(0x21, &(0x7f00000013c0)={r2}, 0x8) r12 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000001400)={0x0, r2}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={r0, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, &(0x7f0000001480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe4, &(0x7f0000001500)=[{}, {}], 0x10, 0x10, &(0x7f0000001540), &(0x7f0000001580), 0x8, 0xd6, 0x8, 0x8, &(0x7f00000015c0)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001740)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x2, '\x00', r10, 0xffffffffffffffff, 0x0, 0x5, 0x4}, 0x50) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)=@o_path={&(0x7f0000001800)='./file0\x00', 0x0, 0x0, r13}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f00000018c0), 0x8000, 0x0) r14 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001900)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000001940)={0x1, 0x80, 0x5, 0x4, 0x2, 0xfd, 0x0, 0xd, 0x8, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x5, 0x3}, 0x8, 0xc, 0x1ff, 0x6, 0x1, 0x5, 0x4, 0x0, 0x2, 0x0, 0x7ff}, r14, 0xf, r3, 0x3) recvmsg$unix(r12, &(0x7f0000003e40)={&(0x7f00000019c0)=@abs, 0x6e, &(0x7f0000003dc0)=[{&(0x7f0000001a40)=""/202, 0xca}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/4096, 0x1000}, {&(0x7f0000003b40)=""/13, 0xd}, {&(0x7f0000003b80)=""/92, 0x5c}, {&(0x7f0000003c00)=""/180, 0xb4}, {&(0x7f0000003cc0)=""/225, 0xe1}], 0x7}, 0x61) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000003f40)={r11, &(0x7f0000003e80)="d646555eb3d227c927c2e445f77600", &(0x7f0000003ec0)=""/122}, 0x20) 51.287340273s ago: executing program 1 (id=6963): close(0xffffffffffffffff) (async) socketpair$unix(0x1, 0x1, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRES16=r4, @ANYRES16=r3], &(0x7f0000000400)='GPL\x00', 0x400000, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r5}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000280)=r1) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002780)=""/4065, 0xfe1}], 0x1}, 0x40020000) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00020000000000a1ca1f94000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000f8ffffff00000000000020008b0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$MAP_CREATE(0x0, 0x0, 0x16) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 51.242186045s ago: executing program 1 (id=6964): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r1}, 0x10) (async) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0b00000007000000d7c900000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xda6}, [@generic={0x5, 0x0, 0xe, 0x5b, 0x6e}, @map_val={0x18, 0x7, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x18000000}, @jmp={0x5, 0x1, 0x7, 0x4, 0x3, 0x40, 0xfffffffffffffffc}, @alu={0x4, 0x1, 0x9, 0x4, 0x8, 0x4, 0x10}]}, &(0x7f00000001c0)='GPL\x00', 0x8b, 0x70, &(0x7f00000004c0)=""/112, 0x41000, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0xa, 0xf1, 0x28}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000600)=[r4, r3], &(0x7f0000000640)=[{0x4, 0x5, 0xf, 0x1}, {0x2, 0x1, 0xf, 0x4}, {0x3, 0x3, 0xe, 0xb}], 0x10, 0xbd6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000740)='ext4_ext_remove_space_done\x00', r5, 0x0, 0x4}, 0x18) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (rerun: 64) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r6, 0x0, 0x20000000}, 0x20) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="b7020000c54a4530bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e6400000000000045040400010000001704000001000a00b7040000000100006a0af2fe0000004f850000008b000000b7000000000000009500000000000000455781a5feee5e1ce784909b849d5550adf200000000000000b61d69f2ffdaa10350e11cb97c8ad51bcda0c4ee6d9674c77404ceb9971e43405d62de53a1a53608c10556e5734eb84049761451ce2e2d9f8004e26f7fcc059c06220002595f6dba87b81d1106fb026cce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895c679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd6fee53f5b2e7b91c61ced1ebad000000000000e8122a793c080a882add4e1179bd4a44f2fcb6d753a78845d8363e0401861abebe428ba953df4aece69311687f4122073a236c3ad198e3f3a532efa04137d452ff47d2638da3261c8362bb7c7824be6195a66d2e17e122040e11e3bd4a69fc6e8d9f7043e09b9e10dc7777bfae5884e4ba1e9cc4a2bbe99e30810400000000000000d63d716c0975e1ce4a655362e7062ff6ab3934555c01840219829472adefa06d3482c7b2711b98eabdca89b77efd13e6dba4a431ce47911834118093b6cabaa17a57727474e1785ee234835088445aa4a9b677d3d342640e328504aea02a2dff0f000000000000bf8fe1d704765de7482040b2fc3000000000000000008947baeaaf954aff687deaa2f804924600273ee26d8115cbca081a14cba24788779291745083fccdddc90d7af35c048d46362ea0d8d79c79ddca066da478c197d4a550470557bc99cca336bd88cd28a5ee651627e3a6fbf6ea53b95ddb64c69c7d8d2f4baddc239828760459564124bad68209d2a1d16ad085886c017679cfcda8b10700ac1e2bcc5ede5b5687aa418abfa29acd7339e73b2cd185c9eb5fb34fccd20ffa155b16c0c309ed6f6663677df37de0ec0d0f548b273940be5d1fe0bae14d1a76bf741330dacd9cc19c0163bcc93059e8d2d120ea257bba458ecd989cb3581a3f270ad48255ac0dad4923e3e357e4e90583ce8d43ec65ed491d87a51d7c13f665dcf772e3ead71112008b16b0ea821f70aee1ccbd71c5a1c21e87d5b7b73d356337dbcf3456ff6cd0d6b98a258e3509a7d15b9dcae4d0d750ffa07909c955e718585b2456308beda2fa03bb9bcf03cdff31ee4b1665b987829c0f0872c006c6e4ed666fe23b343aae943923eedbdb0e7abee90e3da7b98b7d07d2d4816201ad1737798635b0a3ebd3aed120e4500c16e6c9dc729f2cb4ff5106419291d4222980b49ddb9527ce785822d8f4e2bc30a96767f500b9e26e3b12854da63083320d8bfe49d85e0842803dc59d6375bce2b8a93caf39c0ba767880b9bf9407e6a6c0f9a43d1ab51dabf9423b482e848fbe1653ff0c6161fa43543546ce17a42e6cddadaf0767d84407478ffe2d0b567d81201efc81e800d4c0874235ff5cd7f5f0ee71cc2b0193bfc9290627ceaeb0b02931a817688f3a51fa2861e70cbab50a5d434ed8d8841694dba46f3d5a95ae86e4d471684ccf427b2ba53a157b2a7cf7a4c10051bb77822190a14c2ab1f271a7cf9c240b99"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19, 0x0, 0xffffffffffffffff, 0x54}, 0x42) (rerun: 32) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='sys_enter\x00', r8}, 0x10) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) (async) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x28000, 0x0) ioctl$TUNSETOFFLOAD(r11, 0xc004743e, 0x110e22fff6) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r12, 0x4004743d, 0x110e22fff6) (async, rerun: 64) close(r9) (rerun: 64) 51.157412999s ago: executing program 9 (id=6966): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) r4 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) close(r4) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r4, r1, 0x0, r4}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000040)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x53, &(0x7f0000000180)=[{}, {}], 0x10, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0xa6, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) 50.935033738s ago: executing program 1 (id=6967): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r2) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000200), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r1}, &(0x7f0000000080), &(0x7f00000000c0)=r3}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000003000), 0x201, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000e00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r6}, 0x10) mkdir(&(0x7f0000000400)='./file0\x00', 0x29) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f0000001000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@func={0x3, 0x0, 0x0, 0xc, 0x3}, @struct={0x9, 0x2, 0x0, 0x4, 0x1, 0x80, [{0xe, 0x1, 0x1}, {0x8, 0x1, 0x7}]}, @int={0xd, 0x0, 0x0, 0x1, 0x0, 0x77, 0x0, 0x77, 0x1}, @type_tag={0xf, 0x0, 0x0, 0x12, 0x1}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000001080)=""/255, 0x68, 0xff, 0x1, 0x10001, 0x10000, @value=r8}, 0x28) unlink(&(0x7f0000001400)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000001180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@typedef={0x2, 0x0, 0x0, 0x8, 0x2}, @struct={0x5, 0x0, 0x0, 0xc}]}, {0x0, [0x0, 0x61, 0x0, 0x0, 0x2e]}}, &(0x7f0000001300)=""/181, 0x37, 0xb5, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0xfffffffffffffd7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x60260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x18002, 0x5, 0x0, 0x0, 0x0, 0x10000003, 0x7f}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000f4000000000000000000000000000000e44cc65b07"], 0x48) 50.933863027s ago: executing program 9 (id=6968): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000300)={0x1}, 0x8) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x10000000}, 0x800, 0xc8, 0xffff, 0x7, 0xf9, 0xfffffffc, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) r2 = syz_clone(0xe200900, &(0x7f0000000500)="a16d0dd35f722cff27f8d60357f8dcc6b7800e620a864c7a9e509a7967962c9704362141ecfea56e47af1245292163f9f2323e9d164558d39c239978e8847f2e54b1e6625d75eb897671cb343fbbb8a20e02759550f26e1f8bf41dd2fa8799e5bd6a3bd37d2a7a8f23cb772be78340916fc1e7df28755498ef5968cabb79ab09b4235ea9ca2ac5315689f672", 0xfffffffffffffcf3, &(0x7f0000000140), &(0x7f0000000240), &(0x7f0000000780)="e5d3463c532edd98c16fdb6db52bd4d9a7811b89594474bb80b8ab198c87b28795f910e62009d38368952469e20813f03c9ad8420d5b5e2b14e7d66c4b9579c8498da8935349a0b6f6f1059f42f2f11e3cc0f8c986a4a9f4b42ab25fad237d33f2488ae675c1ead4343b11777aa9c0a5c4fd74a0ee61e44094fa40835f50085dfaccbd1dbb0b1e6fafec3f180bdf8c957db7bdf33eb148b5c92ed04430ada3b5cc91fdeead7ac366d67eebfca0e97276a7c081fad6a5388a32bc72530000000000000078dd680188a16c9c8c0fdde71e") perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x8, 0x3, 0x1, 0xd, 0x0, 0xe65, 0x48001, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000040), 0x4}, 0x0, 0x401, 0x7, 0xa275d9aca7b0b5d9, 0xa2, 0x2, 0x9, 0x0, 0x7b9, 0x0, 0x5}, r2, 0x9, r1, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000bf0000000000000095000000000000005ecefab8f2e85c6c1ca711fc206bb8ad6ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bd04000000000000009c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5f683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891184604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e101d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe151acc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394b9ba1a836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429ba63903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6d6fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f25005798ca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9958fad67ccaba76408da35c9f1534c8bd48bbdf9594e8b4ce73febaefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb3b379e221a5318849b6b0679b5d65ab855fc9f1d10022cc20603480ffb1e3392fad690ce56aaa717e56fd55aec3d9d6671f55d7bc33830a4095497586e8d15c2a32d3176d45b783cb27112a69c14134488b6dd302c3e92a7e659351b610ed5ba022f92d4bf26b0a5c10a3c8eb0fabdf0017995ea0c06b41fe6dda769729328d6ee80ab3b4aeeeee7926575d526431184b2034b5cdacc8eaab03cf45af6ec451f65705d8a4375d559e4c3ad80e942d237616d8f2fdd5afe4fdf21478228d9f6299bf67cf1e62fc11c285e18fb65eeb657bc7375401bb175f6d2625195ce8647945dbdfb7eacc06a24832d155059b0f0c36b9433eff190f4c4c160f0484d4d39f5f92e8bd49ad3df23b961fe7bf9e506c5098ca79deb7906257e4ce9035f3a6b29453ee41640ade8b5916f38d19ab6f2fd51a9fd9a2559411967460952acf5c549e5466ee2d8563397a5f028486220fae69611d9bc0f1a68d31ad1a4e387de687ab1537bd46703e4e5ae0f096f731916628bf743a49ea7b7d22c04d738ca439343aaab682d45dc91187e9ff08005358e1f3d864f36ee590fb0da9c958f15f9105c41add43a7c28874e58c31a7acb0467e0bd97f2ccd78615b5144267772381e7498bb98d9e8a3f98b505e5c9645e19d011dd86a1dc134fa4b21ff8ec2d054ae7e0044b4700cd54ce392c2ee515e86070f2df561c15f331a1babfa60504410fa56a848ba1f501c8eb0bd6856451d150cfaf95d6dc889be27e8915bb3670fc76bcbeb390f3cefb5429c84907a92c6eab2b15758194ece4b1461f622510bcff5c0f8354637856f94d71a0841180e78a3a837ae7847c479f5c9c54859cb85393f190042a5dc31197f2c463be8affe29869d71df330b3466fc79b3488b4a2a3e2aae9af6421cd0902347103f2384bf08e5230b37297b668be11b4428b9a8e8c259afa6c73dd87fcc165b2fea66a180bf0"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c"], 0x0, 0x37}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000002c00000002000000050241e98cf6016d8d5432c77800"], 0x0, 0x26, 0x0, 0x1}, 0x28) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) 50.931514268s ago: executing program 8 (id=6970): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x10000, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4000000, 0x3, 0x0, 0x0, @void, @value=0xff070000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd77, 0x4, @perf_config_ext, 0x0, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac8d8000000000000020e16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d10bfe150a7487535f7866907dc6751dfb261a0e3ccae669e173a649c1cfd6587d452d46b7c57d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983c044c03bf3ff03fe3e26e7a23129d6606fd28a7f9105f82317874b33d96b39fa4e045469989d552af6200000003a00000000000000abecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f1623ed38ae89d24e14b40234756ddcebfba2f87925bfacba83109753f543ad027edd68149ee99eebc6f7d6dd4aed4afe1f44ccb19e810879b70a70900000000000000000000d7900a820b6327944e9a217b9800e02a92895614cd50cbf83a1ed25268816b004519c9c5cff097d8000000000009d27d753a30a147b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d6209000000c773713a66b223fa8b148871c8d31d24000025449f106b99893ed20fa7a050fbbef90327e827e513e9606800000000e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e69ee52b59d13182e1f24ed208ada12f7a1525320e71666f472a972d5eb1affb87ba55b2d72078e9f40b4ae7dc3b2aeb0d11cd22c35d32940f19dff00ffffffff080000ff003853e59de7621e348955735264f34b1046a1813668297a7edad187ef106ae7fcbb25090f17d0baadeb8ae190a1fb5a315f8347fb0379659500000000000000000000000000000000000000002fdf0193ec79c90ed210ebc2fbed6d4216770c1b0dec886b388d138c2b69c6aacb714e7264093061c660a5100b7cc165889eb94c8d7c77b6fa06f1a4d8e4a6b6cb37e319c5c22f276b03cae853f42b07ca0b03b1eb32a6b1a81cd511fd0b59d57a11c6a3ebf9731464ad21f07f618efc31023ac60007426162b57e803519954d7c952197b0a508c0e16fda392fa84be38e937d36af1c35138e05a9e8d6dc0272de72c41500000000304402e22af23437126f330f8eb4075daaeae3134ece35cd86d95bd9836bd186c4b6565e967a4e3e86f299b7400994ba136b4eccf3b0f001a266c0d160b3ce1182001d64b52a5ce7f506295d59eea6903b84ffbabf5a5b91c1d6ecce8728a224aec66c610e3becd60a35e848c224f8251947eed20e2b612cb099bfe8924d33ba7f0691fed04a43e9c64b7a1e3165e86cdb9871c678a6bbb14821f441c6c14d1bd78d8ffdfea12c19ea04264335d60b6b7a7da6fb83f33101db32f6ab137d943dd3c1e8db9f3e1263573dc721ae82fe0bc63598751a5092c9f7dbfc39d564834e3703492c2a651643d8ce5c36d97a4812cf73fc8ea0d6"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc200b2c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3a200007"], 0xfdef) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) 50.889492599s ago: executing program 9 (id=6971): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$ppp(0xffffffffffffff9c, 0x0, 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000700"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="04000000000000000e0000000000000008e000", @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00'], 0x50) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB], 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0x16, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000094b6f7bf000000000200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000096bb93d2a27041a2fad77886000000008500200083000000bf09000000000000550901000000000095000010d45f000000000018", @ANYRES32, @ANYBLOB="000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0x42, &(0x7f0000000280)=""/66, 0x40f00, 0x49, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f00000006c0)=[{0x1, 0x1, 0x9}, {0x3, 0x1, 0x1, 0x5}, {0x3, 0x3, 0xf, 0x3}], 0x10, 0x10000}, 0x94) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)=0x6fa6, 0x12) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async, rerun: 64) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180075000e55d60400d0f3aef9c1f77b16fc7333df000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 50.820481632s ago: executing program 4 (id=6972): r0 = bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x1c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001380), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000001480)={[{0x2b, 'rlimit'}]}, 0x8) r7 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001440)={&(0x7f0000000180)="67440e8412", &(0x7f00000012c0)=""/158, &(0x7f0000001380), &(0x7f00000013c0)="416eaa6e7fa52d87b8e4446cab8fdcc6e436e372d2640fc3c5d796ff870f5489b632139b31e84128999fdf038c1be7fa1ba57caa264efd838d015369f2ed1159b69f", 0x8, r2}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002180)={r0, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x8, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002500)={r1, 0xe0, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000002280)=[0x0, 0x0], &(0x7f00000022c0), 0x0, 0x68, &(0x7f0000002300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000002340), &(0x7f0000002380), 0x8, 0x80, 0x8, 0x8, &(0x7f00000023c0)}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 50.819315462s ago: executing program 9 (id=6973): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="5eaa00000000000061108200000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0)=0x60ff20038000, 0xfffffdef) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="5eaa00000000000061108200000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) (async) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) (async) write$cgroup_int(r2, &(0x7f00000001c0)=0x60ff20038000, 0xfffffdef) (async) 50.748234375s ago: executing program 8 (id=6974): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x9, 0x0}, 0x8) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r2}, 0x18) socketpair$unix(0x1, 0x1, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) (async, rerun: 32) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.sched_load_balance\x00', 0x2, 0x0) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0x20) (async, rerun: 32) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x4, 0x0, &(0x7f0000000100)="e0b9547e", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000000, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x7, 0x5, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xd, 0x17, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x80000000}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@call={0x85, 0x0, 0x0, 0x1d}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='syzkaller\x00', 0x8, 0xb6, &(0x7f0000000740)=""/182, 0x41000, 0x20, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x5, 0x10, 0x1, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[r6, r3, r1, r3], 0x0, 0x10, 0x7}, 0x94) (async, rerun: 64) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) (rerun: 64) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000200)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000280)='kfree\x00', r8}, 0x18) (async) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000b80)=ANY=[@ANYBLOB="b400000000eb00000f1000000000000061020000000000009500050000000000929b569e5b468b4c53db3f7ac9bc09236ced48406ba73fa5a110a5040000006c38dc56e6bc1875cceae7ccb46cba30367a0cfe1f5ab6abae43bec5ef0727bfa5532d5300000000624de9c1b8d6acc7", @ANYRES64, @ANYRESDEC, @ANYRES16, @ANYRESDEC, @ANYRESOCT, @ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x10, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000940), 0x10, r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) 50.733505675s ago: executing program 8 (id=6975): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async, rerun: 64) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 50.656574369s ago: executing program 0 (id=6976): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xfffffffa, '\x00', r2, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x50) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x40040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200003, 0x0, @perf_config_ext={0x7}, 0x0, 0x6, 0x0, 0x7, 0x1fd, 0x80000000, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000001811", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x9, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r7, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) gettid() gettid() 50.656150999s ago: executing program 8 (id=6977): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000580)=""/56, 0x38}], 0x1}, 0x100) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0xa01, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xc, 0xffffffffffffffff, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x103}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000604"], 0x0, 0x26}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r1, 0x47, &(0x7f0000003fc0)}, 0xe) syz_open_procfs$namespace(0x0, 0x0) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x18) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) (async) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) (async) r4 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 50.62321621s ago: executing program 9 (id=6978): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000080000000000000027388b4edd7ebac8a599a73bcdc3913f968aae3bfbbc3bc7b2ee7532f84236097229adf4dffc3ceee02451caca9dd870faf7bdb183c2e4e3de112417b7157857e9e8c9306ee2b4fa535001a6a7588bcfb191bf0d97b43c777487a0e5a72f9ee31c359bd7b4f8a6dd69cce7f3ec1c746216eb358e35d2b466c3c7bdcc6aef4b082baea47bcc"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1fd}, 0x94) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x9, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x5}, @restrict={0xf, 0x0, 0x0, 0xb, 0x3}, @volatile={0x5, 0x0, 0x0, 0x9, 0x1}, @type_tag={0x3, 0x0, 0x0, 0x12, 0x3}, @decl_tag={0x10, 0x0, 0x0, 0x11, 0x5, 0x4}]}, {0x0, [0x61, 0x2e, 0x30, 0x5f, 0x0, 0x5f, 0x0]}}, &(0x7f0000000440)=""/25, 0x61, 0x19, 0x1, 0xcc}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0], 0x0, 0x8e, &(0x7f0000000580)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x42, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x12, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="ab7fcad24db8a674eded6e983fc271181ccb317a7ff6908c3d57f8f3ac89c2f577defee0441251590a95a7a182536df42f5b608587ba72e97ef5cca8e72dffef5a126e97f3fb146b2cb46da752065db7ba241a408d29128ee140e1875b8f75b0748efbf96337a43827168b014e7c734a38c2e1fa9fabb21bb5b1b5ccb08520802ecafaae6377266e2febd6468061233ce7a4d55f88690a1bbc2d7e613aa259", @ANYRES64=r2, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x28, '\x00', r4, 0xf, r3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620}, 0x80) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x2, 0x1, 0x0, &(0x7f0000000000)) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000080)=ANY=[@ANYBLOB="2b63709136"], 0x5) write$cgroup_subtree(r6, &(0x7f0000000040)={[{0x2d, 'pids'}, {0x2d, 'cpu'}]}, 0xb) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff85000000040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(0xffffffffffffffff) 50.62068439s ago: executing program 8 (id=6979): socketpair$tipc(0x1e, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000200)=@ethernet={0x306}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)="c12cbc679215c4d62d5a8a578ec894201ef3121fadbbc704235ece45f7ad02ceb958fd320d316fdef577c5fc5793609d902425836f742e99280d51458965649de16817a2ef48fdead4c8e2daa3e9d6545a6d79596563af2c9195d0d75f1ccdc695cb9af29e4ac93fa4a09a340f1fa28f731bff446d156d990c022d305eba1a6ece8e0015dbe2e405b97be12454f4f41e33f6d931b38d248ecce6c93149f11517a9c19abea07db4a2e15e78c0a071d460863173", 0xb3}, {&(0x7f0000000100)="c3a3e54fe53514f759040349e6673aba72042c2f08df7e81f79a878039155d", 0x1f}], 0x2, &(0x7f0000000380)=[@timestamping={{0x14, 0x1, 0x25, 0x88}}], 0x18}, 0x4000040) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000248, &(0x7f0000000400), ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000440)=[0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], 0x0, 0x92, &(0x7f00000004c0), 0x3c, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x200006be, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) sendmsg$tipc(r0, &(0x7f0000000980)={&(0x7f0000000400)=@id={0x1e, 0x3, 0x1, {0x4e20, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000006c0)="2752478ca6890708d0ea8f4a82ca35b7e7005a44105e9c1da1d2b81ff6160620775926386d788c083057e0e2acc975603b10da8df62a2f138c3752934faa62de7c70f5a903a91b19b7888ea045b423a03d28556f05a81f506f6c1cfb95a808eded05927e72543fd3fe2cda1e36d69ba51356e3bf36b3f5efc46c05c1fad79587398de1656a3d9c16362526c001ae58a9aa035816bd5bf9652cb5bc0709281f1abec69fc9fb8851325b799554e9a8cd75e5fa695705356940e642d345cefb560e3a8b0eeda5eb5b7cd99ffff78b5d1ee81dcbd97158899111940d8c1badbd051773", 0xe1}, {&(0x7f00000007c0)="0d86522d121dc11a7f8979d67479e1602f74b2a4e0176033445c67aacdf593cdbaed935909e0723c6ca2b8b910c17b55ddeb136d6d6ecbf76125ba7eb4d2d52226eb0186f4f62c26984f7b69d0a3eabb0944d7a8d5f6edab7c9e68bf2a7bb57b282a3a4eb61cab6e929318774c157df7d73307d5342657", 0x77}, {&(0x7f0000000840)="8f058543e1d15129fc13448d9f13d5c75c95117cd17847a39d30e916d59bb8f476185ab5374237f75366c424f237352014b54bdd73314b9f51946f3b296fa768e9131cae30881f9cd97b5dc63d3d401e864dd44fdcadbb4cb439", 0x5a}], 0x3, &(0x7f00000008c0)="f5045cf6d00b0d13b054267956c86c7805d1ce016dc167fb3c09f26361b5b2751722abdea764685d35fbf50a6b3091b878f9a8b160b7a42860a51ed6ea8142b53db7827969dcd09c40c990357eafdf9dae138074e0ea18ec8fea78522813603abd7104359fb22737b9c6ad6d375c5f226a63d3354ad25403e68b69fe291a6396f1b3fcf127d10419760023214fb03d1705f6fc7f5d7f70a5b7edd37e31ce62cab7d7743fc994a22381df3cd8c0", 0xad, 0x4090}, 0x60) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000711222000000000095000000000000008836a3ad656d80"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 50.543465703s ago: executing program 8 (id=6980): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x8, 0x0, 0x0}}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x10000, '\x00', r3, r4, 0x3}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x124, 0x124, 0x4, [@enum64={0x4, 0x5, 0x0, 0x13, 0x0, 0x6, [{0x9, 0x1, 0xea}, {0x10, 0x9, 0x6eb3d17}, {0x4, 0x10, 0x2}, {0x5, 0x9, 0xffffffff}, {0x2, 0x6, 0x10}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xd, 0x2}, {0x3, 0x2}, {0x4, 0x1}, {0xb, 0x5c4}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0xf}]}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x4e, 0x0, 0x63}, @const={0xc, 0x0, 0x0, 0xa, 0x2}, @enum64={0x6, 0x7, 0x0, 0x13, 0x1, 0xa, [{0xa, 0x4, 0x1ff}, {0x9, 0x81, 0x100}, {0x2, 0xff, 0x8}, {0x7, 0x2, 0x9}, {0x3, 0x5, 0x4}, {0xa, 0x9b9d, 0x9}, {0x6, 0x0, 0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x31d8}}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000380)=""/69, 0x140, 0x45, 0x1, 0x4, 0x10000}, 0x28) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x124, 0x124, 0x4, [@enum64={0x4, 0x5, 0x0, 0x13, 0x0, 0x6, [{0x9, 0x1, 0xea}, {0x10, 0x9, 0x6eb3d17}, {0x4, 0x10, 0x2}, {0x5, 0x9, 0xffffffff}, {0x2, 0x6, 0x10}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xd, 0x2}, {0x3, 0x2}, {0x4, 0x1}, {0xb, 0x5c4}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0xf}]}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x4e, 0x0, 0x63}, @const={0xc, 0x0, 0x0, 0xa, 0x2}, @enum64={0x6, 0x7, 0x0, 0x13, 0x1, 0xa, [{0xa, 0x4, 0x1ff}, {0x9, 0x81, 0x100}, {0x2, 0xff, 0x8}, {0x7, 0x2, 0x9}, {0x3, 0x5, 0x4}, {0xa, 0x9b9d, 0x9}, {0x6, 0x0, 0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x31d8}}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000380)=""/69, 0x140, 0x45, 0x1, 0x4, 0x10000}, 0x28) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0xffffffffffffffff, 0xfffffff9, 0x18}, 0xc) (async) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0xffffffffffffffff, 0xfffffff9, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)=@generic={&(0x7f00000006c0)='./file0\x00'}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x1a, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ldst={0x0, 0x2, 0x2, 0x0, 0x0, 0x40, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @tail_call, @map_idx={0x18, 0xa, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0xfde8, 0x5c, &(0x7f0000000180)=""/92, 0x40f00, 0x4, '\x00', r3, 0x0, r5, 0x8, &(0x7f0000000400)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0xa, 0xfffffffa, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000740)=[r0, r0, r0, r6, r1, r7, r1, r1, r0], &(0x7f0000000780)=[{0x0, 0x1, 0x1, 0x9}, {0x0, 0x5, 0x7}, {0x2, 0x5, 0x8, 0x2}, {0x1, 0x4, 0x0, 0x6}, {0x3, 0x4, 0x10, 0xa}, {0x5, 0x1, 0x5, 0x4}, {0x3, 0x1, 0xf, 0x1}], 0x10, 0x7}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x1a, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ldst={0x0, 0x2, 0x2, 0x0, 0x0, 0x40, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @tail_call, @map_idx={0x18, 0xa, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0xfde8, 0x5c, &(0x7f0000000180)=""/92, 0x40f00, 0x4, '\x00', r3, 0x0, r5, 0x8, &(0x7f0000000400)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0xa, 0xfffffffa, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000740)=[r0, r0, r0, r6, r1, r7, r1, r1, r0], &(0x7f0000000780)=[{0x0, 0x1, 0x1, 0x9}, {0x0, 0x5, 0x7}, {0x2, 0x5, 0x8, 0x2}, {0x1, 0x4, 0x0, 0x6}, {0x3, 0x4, 0x10, 0xa}, {0x5, 0x1, 0x5, 0x4}, {0x3, 0x1, 0xf, 0x1}], 0x10, 0x7}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfdef) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 50.254694425s ago: executing program 1 (id=6981): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x12, 0xffffffffffffffff, 0x260}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0xc111, 0x0, 0x1, 0x8, '\x00', r5, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x50) sendmsg$inet(0xffffffffffffffff, 0x0, 0x40040) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000731162000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000080)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffff4a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r9}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000740)=@o_path={&(0x7f0000000580)='./file0\x00', r4, 0x4000, r8}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 32.300777155s ago: executing program 38 (id=6976): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xfffffffa, '\x00', r2, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x50) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x40040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200003, 0x0, @perf_config_ext={0x7}, 0x0, 0x6, 0x0, 0x7, 0x1fd, 0x80000000, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000001811", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x9, 0x0, 0x200000, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r7, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) gettid() gettid() 32.294328625s ago: executing program 39 (id=6978): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000080000000000000027388b4edd7ebac8a599a73bcdc3913f968aae3bfbbc3bc7b2ee7532f84236097229adf4dffc3ceee02451caca9dd870faf7bdb183c2e4e3de112417b7157857e9e8c9306ee2b4fa535001a6a7588bcfb191bf0d97b43c777487a0e5a72f9ee31c359bd7b4f8a6dd69cce7f3ec1c746216eb358e35d2b466c3c7bdcc6aef4b082baea47bcc"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1fd}, 0x94) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x9, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x5}, @restrict={0xf, 0x0, 0x0, 0xb, 0x3}, @volatile={0x5, 0x0, 0x0, 0x9, 0x1}, @type_tag={0x3, 0x0, 0x0, 0x12, 0x3}, @decl_tag={0x10, 0x0, 0x0, 0x11, 0x5, 0x4}]}, {0x0, [0x61, 0x2e, 0x30, 0x5f, 0x0, 0x5f, 0x0]}}, &(0x7f0000000440)=""/25, 0x61, 0x19, 0x1, 0xcc}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0], 0x0, 0x8e, &(0x7f0000000580)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x42, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x12, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="ab7fcad24db8a674eded6e983fc271181ccb317a7ff6908c3d57f8f3ac89c2f577defee0441251590a95a7a182536df42f5b608587ba72e97ef5cca8e72dffef5a126e97f3fb146b2cb46da752065db7ba241a408d29128ee140e1875b8f75b0748efbf96337a43827168b014e7c734a38c2e1fa9fabb21bb5b1b5ccb08520802ecafaae6377266e2febd6468061233ce7a4d55f88690a1bbc2d7e613aa259", @ANYRES64=r2, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x28, '\x00', r4, 0xf, r3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc0, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2620}, 0x80) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x2, 0x1, 0x0, &(0x7f0000000000)) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000080)=ANY=[@ANYBLOB="2b63709136"], 0x5) write$cgroup_subtree(r6, &(0x7f0000000040)={[{0x2d, 'pids'}, {0x2d, 'cpu'}]}, 0xb) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff85000000040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(0xffffffffffffffff) 32.273856056s ago: executing program 40 (id=6980): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x8, 0x0, 0x0}}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x10000, '\x00', r3, r4, 0x3}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x124, 0x124, 0x4, [@enum64={0x4, 0x5, 0x0, 0x13, 0x0, 0x6, [{0x9, 0x1, 0xea}, {0x10, 0x9, 0x6eb3d17}, {0x4, 0x10, 0x2}, {0x5, 0x9, 0xffffffff}, {0x2, 0x6, 0x10}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xd, 0x2}, {0x3, 0x2}, {0x4, 0x1}, {0xb, 0x5c4}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0xf}]}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x4e, 0x0, 0x63}, @const={0xc, 0x0, 0x0, 0xa, 0x2}, @enum64={0x6, 0x7, 0x0, 0x13, 0x1, 0xa, [{0xa, 0x4, 0x1ff}, {0x9, 0x81, 0x100}, {0x2, 0xff, 0x8}, {0x7, 0x2, 0x9}, {0x3, 0x5, 0x4}, {0xa, 0x9b9d, 0x9}, {0x6, 0x0, 0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x31d8}}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000380)=""/69, 0x140, 0x45, 0x1, 0x4, 0x10000}, 0x28) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x124, 0x124, 0x4, [@enum64={0x4, 0x5, 0x0, 0x13, 0x0, 0x6, [{0x9, 0x1, 0xea}, {0x10, 0x9, 0x6eb3d17}, {0x4, 0x10, 0x2}, {0x5, 0x9, 0xffffffff}, {0x2, 0x6, 0x10}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xd, 0x2}, {0x3, 0x2}, {0x4, 0x1}, {0xb, 0x5c4}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0xf}]}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x4e, 0x0, 0x63}, @const={0xc, 0x0, 0x0, 0xa, 0x2}, @enum64={0x6, 0x7, 0x0, 0x13, 0x1, 0xa, [{0xa, 0x4, 0x1ff}, {0x9, 0x81, 0x100}, {0x2, 0xff, 0x8}, {0x7, 0x2, 0x9}, {0x3, 0x5, 0x4}, {0xa, 0x9b9d, 0x9}, {0x6, 0x0, 0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x31d8}}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000380)=""/69, 0x140, 0x45, 0x1, 0x4, 0x10000}, 0x28) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0xffffffffffffffff, 0xfffffff9, 0x18}, 0xc) (async) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0xffffffffffffffff, 0xfffffff9, 0x18}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)=@generic={&(0x7f00000006c0)='./file0\x00'}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x1a, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ldst={0x0, 0x2, 0x2, 0x0, 0x0, 0x40, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @tail_call, @map_idx={0x18, 0xa, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0xfde8, 0x5c, &(0x7f0000000180)=""/92, 0x40f00, 0x4, '\x00', r3, 0x0, r5, 0x8, &(0x7f0000000400)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0xa, 0xfffffffa, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000740)=[r0, r0, r0, r6, r1, r7, r1, r1, r0], &(0x7f0000000780)=[{0x0, 0x1, 0x1, 0x9}, {0x0, 0x5, 0x7}, {0x2, 0x5, 0x8, 0x2}, {0x1, 0x4, 0x0, 0x6}, {0x3, 0x4, 0x10, 0xa}, {0x5, 0x1, 0x5, 0x4}, {0x3, 0x1, 0xf, 0x1}], 0x10, 0x7}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x1a, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ldst={0x0, 0x2, 0x2, 0x0, 0x0, 0x40, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @tail_call, @map_idx={0x18, 0xa, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0xfde8, 0x5c, &(0x7f0000000180)=""/92, 0x40f00, 0x4, '\x00', r3, 0x0, r5, 0x8, &(0x7f0000000400)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0xa, 0xfffffffa, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000740)=[r0, r0, r0, r6, r1, r7, r1, r1, r0], &(0x7f0000000780)=[{0x0, 0x1, 0x1, 0x9}, {0x0, 0x5, 0x7}, {0x2, 0x5, 0x8, 0x2}, {0x1, 0x4, 0x0, 0x6}, {0x3, 0x4, 0x10, 0xa}, {0x5, 0x1, 0x5, 0x4}, {0x3, 0x1, 0xf, 0x1}], 0x10, 0x7}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfdef) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 32.229213978s ago: executing program 41 (id=6981): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x12, 0xffffffffffffffff, 0x260}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0xc111, 0x0, 0x1, 0x8, '\x00', r5, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x50) sendmsg$inet(0xffffffffffffffff, 0x0, 0x40040) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xb, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000731162000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000080)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffff4a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r9}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000740)=@o_path={&(0x7f0000000580)='./file0\x00', r4, 0x4000, r8}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 32.206398948s ago: executing program 42 (id=6972): r0 = bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x1c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001380), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000001480)={[{0x2b, 'rlimit'}]}, 0x8) r7 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001440)={&(0x7f0000000180)="67440e8412", &(0x7f00000012c0)=""/158, &(0x7f0000001380), &(0x7f00000013c0)="416eaa6e7fa52d87b8e4446cab8fdcc6e436e372d2640fc3c5d796ff870f5489b632139b31e84128999fdf038c1be7fa1ba57caa264efd838d015369f2ed1159b69f", 0x8, r2}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002180)={r0, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x8, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002500)={r1, 0xe0, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000002280)=[0x0, 0x0], &(0x7f00000022c0), 0x0, 0x68, &(0x7f0000002300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000002340), &(0x7f0000002380), 0x8, 0x80, 0x8, 0x8, &(0x7f00000023c0)}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.614840525s ago: executing program 7 (id=7470): bpf$MAP_CREATE(0x0, 0x0, 0x73) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func={0x1, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x61, 0x5f, 0x5f, 0x5f]}}, &(0x7f0000000340)=""/155, 0x2a, 0x9b, 0x0, 0x2}, 0x28) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x80000001, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc, 0x7}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) 1.767410949s ago: executing program 7 (id=7480): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x11, 0xc, &(0x7f0000001140)=ANY=[@ANYRES16=r2], &(0x7f0000001100)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001680)={&(0x7f0000000040)='hrtimer_init\x00', r4}, 0x18) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000d5030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000001000)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67152946, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) 1.304586158s ago: executing program 2 (id=7485): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2037, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) close(r5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r9) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(&(0x7f0000000200)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r2) 1.167567414s ago: executing program 5 (id=7489): r0 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x40000000000000, 0x0, 0x0, 0x7, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{}, &(0x7f0000000200), &(0x7f0000000080)}, 0xfffffffffffffff7) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb01001800000000000000ac000000ac000000050000000e0000000000000e0500000001000000030000000000000901000000100000000500000447e600000000000003000000030000000d000000030000f3678e000001000000000000000080000007000000000000008000000005000000030000000600000010000000030000930400000001000000040000000300000007000000030000000000000003000000ff07000005000000000000000000000300000000040000000100000000000000002e612e00"], &(0x7f00000013c0)=""/211, 0xc9, 0xd3, 0x1, 0xc00000}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x16060) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffe49) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="9d0900"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200000000000100"/26], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001540)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xfffffffb, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000015c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x3}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="fffffffc000000001a1700000800000000003ec075c0e4e005b007fd3c780010", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r3}, &(0x7f0000000800), &(0x7f0000000840)=r4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="020000000400000006000000050000000000", @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) 1.163455303s ago: executing program 2 (id=7492): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x7) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x8) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x100) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r0, 0xe0, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f00000011c0)=[0x0, 0x0, 0x0], &(0x7f0000001200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9c, &(0x7f0000001240)=[{}], 0x8, 0x10, &(0x7f0000001280), &(0x7f00000012c0), 0x8, 0xa5, 0x8, 0x8, &(0x7f0000001300)}}, 0x10) (async) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x5}, 0x50) (async) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000015c0)=@generic={&(0x7f0000001580)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000016c0)={0x18, 0x0, &(0x7f0000000100), &(0x7f0000000140)='GPL\x00', 0x8, 0x1000, &(0x7f0000000180)=""/4096, 0x40f00, 0x20, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001480)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000014c0)={0x5, 0xc, 0x6, 0x7}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001600)=[r0, r5, r0, r0, r0, r0, 0xffffffffffffffff, r6], &(0x7f0000001640)=[{0x5, 0x3, 0xe, 0x9}, {0x0, 0x1, 0xc, 0x8}, {0x0, 0x2, 0xd, 0x2}, {0x3, 0x1, 0xffffffff, 0x4}, {0x2, 0x3, 0x1, 0x6}, {0x0, 0x3, 0x9, 0x5}], 0x10, 0xfffffff9}, 0x94) (async) openat$cgroup_type(r0, &(0x7f0000001780), 0x2, 0x0) socketpair(0x15, 0x5, 0x1, &(0x7f00000017c0)) (async) r7 = openat$cgroup_ro(r1, &(0x7f0000001800)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f0000001840)=0xffffca41) (async) openat$cgroup(r7, &(0x7f0000001880)='syz0\x00', 0x200002, 0x0) (async) perf_event_open$cgroup(&(0x7f0000001900)={0x2, 0x80, 0x2, 0x98, 0x9d, 0x1, 0x0, 0x100, 0x80, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f00000018c0), 0x4}, 0x80a0, 0x4, 0xfe, 0x4, 0xffffffff, 0x0, 0xcdc, 0x0, 0xe, 0x0, 0x5}, r1, 0xa, r1, 0xe) bpf$TOKEN_CREATE(0x24, &(0x7f0000001980)={0x0, r2}, 0x8) r8 = perf_event_open(&(0x7f0000001a00)={0x2, 0x80, 0x2, 0x5, 0xff, 0xff, 0x0, 0x81, 0x80020, 0xe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffffb, 0x4, @perf_bp={&(0x7f00000019c0), 0xe}, 0x10000, 0x3ce4, 0x7, 0x1, 0x80, 0x45e, 0x3, 0x0, 0x6742b2e1, 0x0, 0x5}, 0x0, 0xc, r1, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000001a80)='cgroup.type\x00') r9 = bpf$PROG_LOAD(0x5, &(0x7f0000001d00)={0x13, 0x1c, &(0x7f0000001ac0)=@raw=[@map_fd={0x18, 0x5, 0x1, 0x0, r7}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x43d}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}], &(0x7f0000001bc0)='GPL\x00', 0x3, 0x0, 0x0, 0x91e3aee37860f04, 0x2, '\x00', r3, @fallback=0xc, r0, 0x8, &(0x7f0000001c00)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000001c40)={0x5, 0x5, 0x9, 0xff}, 0x10, r4, r7, 0x1, &(0x7f0000001c80)=[r0, r5, r6, 0x1, r0, r5], &(0x7f0000001cc0)=[{0x5, 0x4, 0x7, 0x4}], 0x10, 0xffffff80}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002080)={r9, 0xe0, &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001dc0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000001e00), &(0x7f0000001e40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x69, &(0x7f0000001e80)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000001ec0), &(0x7f0000001f00), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000001f40)}}, 0x10) r11 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002100)={r11, r8, 0x0, 0x4, &(0x7f00000020c0)='GPL\x00'}, 0x30) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000021c0)={{r0, 0xffffffffffffffff}, &(0x7f0000002140), &(0x7f0000002180)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002200)={r12}, 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000022c0)={{r0, 0xffffffffffffffff}, &(0x7f0000002240), &(0x7f0000002280)=r1}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002540)={r1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000025c0)={0x6, 0xe, &(0x7f0000002300)=@raw=[@cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x1634}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @exit], &(0x7f0000002380)='GPL\x00', 0x559, 0xf3, &(0x7f00000023c0)=""/243, 0x40f00, 0x40, '\x00', r10, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000024c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000002500)={0x5, 0x8, 0x6e, 0xf6b3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002580)=[r0, r14], 0x0, 0x10, 0x8}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000002680), 0x0, 0x0) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000002740)={r13, &(0x7f00000026c0)="fa1b24ad12b379e2fba4c43d4e67baa027e97b19a9187a6f7e6814a55c239a178f8581491570a211dd8ba3a6d0586027263e21f15b0c37f503ced9c6e211575be88ec621c5e0c09aeed3073c181f17312765da0369d44b49b96a708b38ec872c47a869cfb7391436"}, 0x20) 1.150924064s ago: executing program 2 (id=7493): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x8, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x2e}}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x18) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) (async) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.150261364s ago: executing program 5 (id=7494): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) close(r0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x3, 0x7, 0x4e, 0x0, 0x6, 0x8, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x2, 0x3ff, 0xd30, 0x7, 0x8, 0x4, 0xff9f, 0x0, 0x1, 0x0, 0x9}, 0xffffffffffffffff, 0x9, r0, 0x2) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x3, 0x4, 0x3, 0x9, 0x0, 0x1, 0x982, 0xa, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x81, 0x4, @perf_config_ext={0x9, 0x3}, 0x40, 0x0, 0x4, 0x8, 0x0, 0xfff, 0xb44f, 0x0, 0x7fffffff, 0x0, 0xf9b}, 0x0, 0x1, r1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)=@generic={&(0x7f00000001c0)='./file0\x00', r0}, 0x18) openat$cgroup_type(r0, &(0x7f0000000240), 0x2, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6a, 0x6a, 0x7, [@typedef={0x3}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x4}]}, @typedef={0xf, 0x0, 0x0, 0x8, 0x1}, @datasec={0x2, 0x1, 0x0, 0xf, 0x2, [{0x3, 0x2, 0x453}], "48ee"}, @struct={0x1, 0x1, 0x0, 0x4, 0x1, 0x5, [{0x1, 0x4, 0xfffffffa}]}, @fwd={0x3}]}, {0x0, [0x0, 0x61, 0x2e, 0x61, 0x0]}}, &(0x7f0000000340)=""/217, 0x8b, 0xd9, 0x1, 0x10}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0xffff3cb4, 0x3, 0x10000, 0x2000, 0xffffffffffffffff, 0x7, '\x00', 0x0, r0, 0x0, 0x5, 0x4, 0xd}, 0x50) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1ff, 0x0, r3, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4}, 0x50) r5 = openat$cgroup_procs(r0, &(0x7f0000000580)='tasks\x00', 0x2, 0x0) close(r5) syz_clone(0x30000000, &(0x7f00000005c0)="5b02476851d774a1b8efbe29752acfd8d9559179bb4a0491ed5368658d20346a87978a200dd098852b72756a625be56481afab9ed066595117eac2baaa4b8fc2fda6d99b9ddcae7ba3400396dde26cede0fc33653f0851aa351d975dc883e63db5e9705a011813238b4e57295daaa707816a0997c93c1bf41aa7cde86b910586e299db3e5410f6eb586e86535c742f9097340d3c3d211e1e324e6e2eedb057624659de822b6d379c021d033f0c9541a286cf3b53fafb195a033d739df8df333f99ad1080c4a1f3618e36a63cc534fec5", 0xd0, &(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000780), 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a00)={r0, 0x0, 0xb6, 0xf, &(0x7f00000007c0)="4eedcffdedc4e1608369d489bc678d5311e8003c0235511c8b7fc6b1136745481d6d510b25c11951edfc6dfd97206fad31e4bd136f1e0286834782468058ffc0927c1fc24491711b41ff6ba9ac6fe215f72c6984f1303c6679cbdaa3aa5edad08569e97ac8bcaf33f16266489deea47281ffcef46e37117bcc61450958f6412864ad94d933547f55d2e0f855f1520494741a15391d0d451469294e1b5efa10c9b5f8a1948c3e05bada3303addf202da4f16a4d9074e7", &(0x7f0000000880)=""/15, 0xbc, 0x0, 0xa0, 0x42, &(0x7f00000008c0)="1b386d07cad96467b2b362bb33e994f7a11e3cb20cdec12d479513a2a74047747b270c06edde93c46621fcaf2bed1f394398c65f381bbbc37144613da737b48d33a443640ef2e9b8cd58d45b9f6aca08cfa2e19711301740c6a74c3d800bd79e8eed819f7625514023afafa27a19579b0f6961204c8a254a8f8263421c962204c9925b35c1770d3173dcc57b9350d820be69f42a416d8c62527d6cc8fd133905", &(0x7f0000000980)="a6023d23259c36a6f1c62ba8fa0aa26986e5255ec13b409d2f6760bd8590bc48d69c9e9b00cccca1e2174ff8fc32c04ba9bfe2b1b74579049cf0d5fbcd6b2d23dfc8", 0x4, 0x0, 0x7}, 0x50) write$cgroup_subtree(r0, &(0x7f0000000a80)={[{0x2d, 'hugetlb'}, {0x2b, 'net_cls'}, {0x2d, 'perf_event'}, {0x2b, 'net_cls'}, {0x2d, 'pids'}, {0x2b, 'cpuset'}]}, 0x35) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b40)={r0, 0x58, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000bc0)=@generic={&(0x7f0000000b80)='./file0\x00', 0x0, 0x8}, 0x18) r7 = openat$cgroup_int(r0, &(0x7f0000000c00)='cgroup.max.descendants\x00', 0x2, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000c40), 0x2, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x1e, 0x4, &(0x7f0000000c80)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xb}, @map_fd={0x18, 0x7, 0x1, 0x0, r4}], &(0x7f0000000cc0)='syzkaller\x00', 0x6, 0x3d, &(0x7f0000000d00)=""/61, 0x41000, 0x40, '\x00', r6, @sk_lookup, r2, 0x8, &(0x7f0000000d40)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000d80)={0x401, 0x1, 0x3e1e1940, 0x2}, 0x10, 0xffffffffffffffff, r4, 0xa, 0x0, &(0x7f0000000dc0)=[{0x1, 0x3, 0x0, 0x5}, {0x0, 0x3, 0xc, 0xa}, {0x4, 0x5, 0x8, 0xc}, {0x3, 0x2, 0x10, 0x3}, {0x1, 0x4, 0xc, 0xc}, {0x5, 0x2, 0x3, 0x3}, {0x0, 0x1, 0x3, 0xc}, {0x0, 0x2, 0x4, 0xc}, {0x2, 0x1, 0x2, 0x1}, {0x0, 0x2, 0xf, 0x9}], 0x10, 0x40}, 0x94) mkdir(&(0x7f0000000f40)='./file0\x00', 0x100) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={@map=r4, 0x1a, 0x0, 0x8, &(0x7f0000000f80)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000fc0)=[0x0], &(0x7f0000001000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001040)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000010c0)={@map=r4, r8, 0x21, 0xc, 0x0, @void, @value=r8, @void, @void, r10}, 0x20) write$cgroup_int(r7, &(0x7f0000001100)=0x4, 0x12) socketpair(0x2a, 0x3, 0x7, &(0x7f0000001140)) socketpair(0x9, 0x6, 0x7, &(0x7f0000001180)) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000011c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001200)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x2, '\x00', 0x0, r11, 0x2, 0x0, 0x4}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001280)='./cgroup.net/syz0\x00', 0x1ff) 1.073059267s ago: executing program 3 (id=7496): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000400)=""/239, 0xef}], 0x1}, 0xbf40) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@generic={0x0}, 0x18) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000280)={0x0, &(0x7f0000000200)}) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x20000000) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000580)={0x1, &(0x7f00000004c0)="1c4a5d153b0b53e7bfb6fc230f5bbf76c8a7b9bd4368e4c1a4f3df3fa0ed6161ff80a17322d8a7658f817ec0d01e7f5b9beead226f8d31de8af739cf8b4ed4c88dfe3ddc2d257a628c11cb5c527d2449453f144eeb6d95ed8dda728c299847b6cad2447ef2d7717dd003b70add39cc0ef4e5b749258660d57f8a3f697bbbaf1c48ea7b68f7b46ac38ae073074cec50306256151d4dc3be7fd0729df7a618fc49e63f5167fd199ad38464b97089185759", &(0x7f00000003c0)=""/97}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@fallback=r1, 0x20, 0x0, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0]}, 0x40) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 1.072737267s ago: executing program 5 (id=7497): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/148, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff79}, 0x16) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r4, 0x0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0xefa}, 0x28) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRES8=r4, @ANYBLOB="6f4f4d9d3b02c70515e7ac778e5da28ae0358b4f504dc805ee99c0e7c792593ecf886690bfa5eb813716a1cbc75242f48125fd26f62e4a4927dffcc05a3c3c6dae0d0aaff90071adb21915f3d618e7f8b7992d4eafd195e516d2b75ecafc6f389e76c242b59c2a70a662eab246b5279b027f27f6cee8c527accdd9b74e334cc4bfe513e1b9f65e1f2c6f799294a95a09a8b860cac3a26a51ae64b44c26c1a68731bca6f07243e38a8a7dc320c6f80075332c482cee22d86c7cac9c93e0275f6883d68ce4de5881b3ed6d6d23bd7134850a1535c84e15f5", @ANYRESOCT=r1, @ANYRES16=r0, @ANYRES16=r3, @ANYBLOB="24e9a22c8799a32478609ccfa6e491ba262842da672b730a3cde58a3ccc61299a43ceaf2ae7b4c449ae9abcdf35a2dafffeac6af1e6b1b829c2bee49ad1c445e1cb0dcd6ab9c78742cc081b5fea01a8047b96a4937be397d6b6ab1a7753750299bc7f028b35e6e20c4222db12df6b4d0b90d8c1136f74297d6118072de30eb1944aaa913d51cd53b97965a8efd523544a95fd6669316962c17aba18f64d3cda7f178"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.030987549s ago: executing program 2 (id=7498): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1}, 0x2000c040) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="070000000400000008020000015267aca76d9f39e9f4718f37ee2599bcbbdc8d99770f6b4e366918cb1738168b565bdbd6b3f9e86e4dc325ccadfd2ebbbf15bd28716996f774c3b1bb0407e45b3d6e6bf5f44eaa6d30513e86ae026b970eeacaf57cab556cac8c6a54ae3f391be9d24dc9c50d8064c389637d8dc9a4d44177ecc1ddd0104fafaa65a2dc8fb193abde5cdf945efbb8c92d5e01da0765c1814a8bda2a7e1c68cc6ef8e14c2c9bc055ef858077719da24dcafb"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpu.max.burst\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@fallback=r4, 0x11, 0x1, 0x1c, &(0x7f0000000040)=[0x0], 0x1, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0], &(0x7f0000000280)=[0x0]}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x18) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) 966.490292ms ago: executing program 3 (id=7499): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) syz_open_procfs$namespace(0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x28) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) close(r0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r5}, 0x18) (async) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000000), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x23, 0x80000, 0x36, &(0x7f0000000040)={0x0, 0x0}) close(r6) close(0xffffffffffffffff) (async) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 902.632574ms ago: executing program 3 (id=7501): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x20000000) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000001c0)='kmem_cache_free\x00', r3}, 0x10) close(r0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="1800"/13, @ANYRES32=r5, @ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r6}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x8, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000dd00000000000002000000"], 0x48) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x2d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0xe3, 0x0, 0x0, 0x0, 0x30004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x7915d4bf}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000040000000800000014"], 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7757, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2000}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r10, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x89, &(0x7f0000000700)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0x75, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000cc0)={0x6, 0x25, &(0x7f0000000d80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2f5e5d5b}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x7}, @map_fd={0x18, 0x7, 0x1, 0x0, r11}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, @map_fd={0x18, 0xb, 0x1, 0x0, r7}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_fd={0x18, 0x2, 0x1, 0x0, r8}, @printk={@d}, @ringbuf_query, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x10, &(0x7f0000000440)=""/16, 0x0, 0x40, '\x00', r12, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x4, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000b40)=[{0x3, 0x3, 0x1, 0x1}, {0x4, 0x5, 0x3, 0x8}, {0x80004, 0x3, 0xb, 0xb}, {0x1, 0x2, 0xb}, {0x3, 0x44, 0xe, 0xc}, {0x1, 0x2, 0x9, 0x2}, {0x2, 0x1, 0x8, 0xa}, {0x4, 0x2, 0x7, 0x7}, {0x1, 0x1, 0x0, 0xc}, {0x1, 0x1, 0xd, 0xa}], 0x10, 0x5}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 902.159064ms ago: executing program 7 (id=7502): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='mm_page_alloc\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='mm_page_alloc\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x740c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_bp={0x0, 0x7}, 0x1e51, 0x1, 0x0, 0x7, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x8, 0x40, 0x2, 0x0, 0x8000, 0x84254, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x9, 0x3ff}, 0xe2, 0x929, 0x7ff, 0x6, 0x7ff, 0x2e0d, 0xdf, 0x0, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0500000004000000040000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000eeff00"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000680)='./cgroup/../file0/file0\x00', 0x109) (async) mkdir(&(0x7f0000000680)='./cgroup/../file0/file0\x00', 0x109) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r4}, 0x18) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x100, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x100, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000000)={0x1, 0x2, [@empty, @empty]}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) 845.219756ms ago: executing program 5 (id=7503): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'rose0\x00', 0x112}) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r5}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r6}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff7) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 712.591811ms ago: executing program 7 (id=7505): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r3 = getpid() perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x9, 0x1, 0x1, 0x6e, 0x0, 0x1, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4}, 0x250, 0x2, 0x44c, 0x9, 0x6, 0x0, 0x613, 0x0, 0x2, 0x0, 0x7}, r3, 0x4, 0xffffffffffffffff, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1e, 0x0, 0x2, 0x5, 0x41c22, r2, 0x396f, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x16, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x8, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1200000004000000080000000280"], 0x50) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000540)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095", @ANYBLOB="de5a1038d6b526cdfad64485733fdadc9f74c040c7a114ae3b9edfe1243042cd9ac77093dc7bc6bc9e01a3eed3b02b739ef72ae754ba43fb05ad01d5d7079e45673e051d3dfde11dd7313a23043a4b636b1b9765fe82ac74c9393e77f2f4", @ANYRES16=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) 711.830831ms ago: executing program 3 (id=7506): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @call={0x85, 0x0, 0x0, 0x23}]}, 0x0, 0xfffffffe, 0x4e, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 707.914932ms ago: executing program 3 (id=7507): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {0x3, 0x3, 0x3, 0xa, 0x1, 0xfe00}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 667.863723ms ago: executing program 3 (id=7508): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x40000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)=0xc00600000000c006) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) 560.513608ms ago: executing program 7 (id=7509): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x14, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x80010000, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000280)=ANY=[@ANYRESDEC=0x0], 0x0, 0xf, 0x2a, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='kvm_msi_set_irq\x00', r1, 0x0, 0x3}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r2}, 0x0, &(0x7f0000000040)}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'bridge_slave_0\x00', 0x8112}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x40000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r9}, 0x10) write$cgroup_subtree(r8, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 521.369049ms ago: executing program 6 (id=7510): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="000000b7080000080000007b8af8ff00a6d527000000bf910000000059c4d233a95eae3429ffef2d1fb0b7cc00000000000085000000010000000000000000001f6c95d0c92d048a0225300e60d81bdcfbfdf7a3be105101097cbaf3a9a7c49a051d7e32ef18c06274e9488848b1a7c9839b1e1de519a0ae4b5786a588d6f35efdff7ba4f1bb8c088ce26a11ed3c5c76bb9d7ce1dd36cdd5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6151, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0x3, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000200000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) close(r2) (async) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e020000000000000000000000000000060400000000"], 0x0, 0x37}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r6, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedab00}, 0x94) (async) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) perf_event_open(0x0, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 485.02682ms ago: executing program 6 (id=7511): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000800000004000000bb7f1ad04d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffd02}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x141141, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x2, 0x80, 0xc2, 0xc}}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) 380.145885ms ago: executing program 6 (id=7512): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext, 0x0, 0xb2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) (async) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000005000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="008f0a6ecc", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000003c0)={r2, &(0x7f00000006c0), &(0x7f0000000280)=""/12, 0x2}, 0x20) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x7fffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xf, r5, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) write$cgroup_subtree(r7, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r8, 0x7a, 0xfffffffffffffffe}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0xfffffffffffffe02, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x10, 0x0, 0xa, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x17, 0x0, &(0x7f0000000440)='GPL\x00', 0x800, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff35, 0x0, 0x0, 0x4, &(0x7f0000000440), &(0x7f0000000480)=[{0x2, 0x2, 0x0, 0x5}, {0x3, 0x3, 0xb, 0x3}, {0x2, 0x4, 0x3, 0xb}, {0x4, 0x5, 0x24000002, 0x1}, {0x0, 0x2, 0x0, 0xc}, {0x3, 0x2, 0x6, 0x8}, {0x2, 0x4, 0x5, 0xc}], 0x10, 0xb}, 0x94) 354.877926ms ago: executing program 5 (id=7513): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x18) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 244.85551ms ago: executing program 6 (id=7514): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x4, 0x8, 0x2c, 0x5, 0x0, 0x1, 0x200, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0, 0xb}, 0xc0, 0x9, 0x9, 0x9, 0x0, 0x0, 0xfff, 0x0, 0x7ff, 0x0, 0x9}, 0x0, 0x3, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000200)='GPL\x00'}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000080)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r3, &(0x7f00000002c0), 0x0}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x14}, 0x108003, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r6}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') 176.563773ms ago: executing program 7 (id=7515): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) sendmsg$inet(r1, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x48000) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000000)=ANY=[@ANYRES64], 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0xc8, 0x2, 0x7, 0x0, 0x10001, 0xa}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xe) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000004b000000180100002020702500000000002020207b1af8ff000000e2bea100000000000007010004f8ffffffb702001a08000000b703000006000000850000002d000000c78b00000e000000950000000000000014914dcb97655d1e5c94d065331abadc64b9b3188410d831b8d7e8a95ee29bcbb5ebee1c7e08c07c4085e2d953ce48208ec35ebedcfec3681a6c5b0cc9f040f374de3194a2f8a7bcbcfd3831cdf8bbb666b36dadeb2fc617c42c7853b59e366d22d2"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r5}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x88541, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffffc, 0x8, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000007448e7a20000b80a", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000240)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000300)=""/73, 0x49}, {&(0x7f0000000380)=""/129, 0x81}, {&(0x7f00000004c0)=""/94, 0x5e}], 0x3}, 0x1) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r12}, 0x10) 175.435323ms ago: executing program 2 (id=7516): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x24, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0xffffffffffffff87}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) (async) mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x5b) (async) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) (rerun: 64) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000880), 0x12) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) sendmsg$tipc(r4, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b3063f040404b37d00e", 0x66}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc198d5fce523ca9aeee4", 0x24, 0x4000000}, 0x2000c041) (async) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) close(r7) 128.269735ms ago: executing program 2 (id=7517): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0), 0x402, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) syz_clone(0x64087000, 0x0, 0xffffff59, 0x0, 0x0, 0x0) write$cgroup_subtree(r9, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033200fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 52.991678ms ago: executing program 5 (id=7518): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@typedef={0x4, 0x0, 0x0, 0x7}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x21000000, [{0x0, 0x2, 0x1000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0xda]}}, &(0x7f0000000340)=""/142, 0x52, 0x35b, 0x1}, 0x20) close(r0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x7, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x4, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0xfffffff1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="61106800000000006113740000000000bfa00000000000000700000008ffffffd503010017740040950000000000000069163a0000000000bf67000000000000350607000fff07201706000020190000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004d83dde4c375000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369226066812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20ceddf4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f6746a9709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c1d926a0f6a5480a55c22fe3a5ac00000000000000000000000500002000000000fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e14d90deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b06ff7f0000000000007f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a1f37302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089e0b1c23c0f3cdad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a1a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631d22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0af1cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4c6ea9604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c29984864961a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a09d8be0fc5beecf153236c19740be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000000000000000000000000000000000001386866b311bd144bc32e059658c9f8342c90c1ade31b78072841b8b5a943d62a44cea6b050c42e3c205fad6a23fb43c93da0f49d911877265e6ee443e37397ecf89021e7f579e8d3a74c12b52938d91e9de07fc8eeeb9505f4a9c26266bf5449484ccc1317c7476"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000f4ffffffe7ffff", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(r4, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000240)=""/252, 0x37, 0xfc, 0x1}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r6}, 0x10) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) 465.38µs ago: executing program 6 (id=7519): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000016e29c3141a9796dd000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffc4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000880)=""/166}, 0x20) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000040)='rxrpc_tx_data\x00', r3}, 0x18) (async) socketpair(0x3e, 0x3, 0x7, &(0x7f0000000000)) (async) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002100), 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x8, &(0x7f0000000540)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000640)='syzkaller\x00', 0x7, 0xf9, &(0x7f0000000080)=""/249}, 0xfffffffffffffe65) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x2a, &(0x7f0000000100)=r8, 0x4) sendmsg$unix(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)='M', 0x1}], 0x1}, 0x0) (async, rerun: 64) recvmsg$unix(r6, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) (async, rerun: 64) write$cgroup_type(r6, &(0x7f0000000000), 0x9) close(r7) (async) close(r5) (async) mkdirat$cgroup(r8, &(0x7f0000000300)='syz1\x00', 0x1ff) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r5, 0x40047452, &(0x7f0000000180)) (async, rerun: 64) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0xc, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x1, 0xa, 0x1, 0x0, 0xfffffffffffffff4, 0xfffffffffffffff0}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xc}, @generic={0xb, 0x8, 0x4, 0x7, 0x8}, @ldst={0x1, 0x0, 0x3, 0x0, 0x4, 0xfffffffffffffffc, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0xfff}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}, @jmp={0x5, 0x1, 0xc, 0x0, 0x6, 0x2, 0x8}], &(0x7f0000000340)='GPL\x00', 0x8, 0x5b, &(0x7f00000007c0)=""/91, 0x40f00, 0x43, '\x00', 0x0, 0x25, r8, 0x8, &(0x7f0000000680)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0xa, 0xffffffff, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, r0, r2, r2]}, 0x94) (rerun: 64) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000a40)={r10, r2}, 0xc) 0s ago: executing program 6 (id=7520): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYRES32], 0x50) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r4, 0x0) (async, rerun: 32) write$cgroup_pid(r2, &(0x7f0000000000)=r4, 0x12) (rerun: 32) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r6}, 0x10) (async) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r8}, 0x10) (async) write$cgroup_int(r7, &(0x7f0000000200), 0x43451) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.204' (ED25519) to the list of known hosts. [ 20.717686][ T24] audit: type=1400 audit(1758185951.930:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.718592][ T267] cgroup: Unknown subsys name 'net' [ 20.740731][ T24] audit: type=1400 audit(1758185951.930:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.768441][ T24] audit: type=1400 audit(1758185951.960:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.768645][ T267] cgroup: Unknown subsys name 'devices' [ 21.003990][ T267] cgroup: Unknown subsys name 'hugetlb' [ 21.009807][ T267] cgroup: Unknown subsys name 'rlimit' [ 21.176482][ T24] audit: type=1400 audit(1758185952.390:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.200108][ T24] audit: type=1400 audit(1758185952.390:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.205170][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.225766][ T24] audit: type=1400 audit(1758185952.390:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.257999][ T24] audit: type=1400 audit(1758185952.450:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.284242][ T24] audit: type=1400 audit(1758185952.450:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.284422][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.310362][ T24] audit: type=1400 audit(1758185952.490:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.345309][ T24] audit: type=1400 audit(1758185952.490:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.894241][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.901591][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.909341][ T275] device bridge_slave_0 entered promiscuous mode [ 21.917400][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.925109][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.932598][ T275] device bridge_slave_1 entered promiscuous mode [ 22.013163][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.020514][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.028582][ T276] device bridge_slave_0 entered promiscuous mode [ 22.044341][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.051647][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.059317][ T279] device bridge_slave_0 entered promiscuous mode [ 22.068394][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.075470][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.082878][ T279] device bridge_slave_1 entered promiscuous mode [ 22.089451][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.096600][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.104454][ T276] device bridge_slave_1 entered promiscuous mode [ 22.123056][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.130288][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.137702][ T278] device bridge_slave_0 entered promiscuous mode [ 22.146474][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.154334][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.161907][ T278] device bridge_slave_1 entered promiscuous mode [ 22.189738][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.197085][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.204480][ T277] device bridge_slave_0 entered promiscuous mode [ 22.234366][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.241547][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.249199][ T277] device bridge_slave_1 entered promiscuous mode [ 22.302146][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.309229][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.316627][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.323935][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.378173][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.385510][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.393291][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.400686][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.417027][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.424526][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.432006][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.439837][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.447762][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.455415][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.486897][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.496120][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.503360][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.516776][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.534886][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.543422][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.550604][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.572299][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.579907][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.588298][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.595534][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.603579][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.622578][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.630652][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.639285][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.647794][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.656291][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.663328][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.670682][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.679100][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.686688][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.695206][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.703614][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.711012][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.731397][ T275] device veth0_vlan entered promiscuous mode [ 22.740028][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.749396][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.758325][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.765799][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.773768][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.782321][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.789336][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.796775][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.805280][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.812404][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.819735][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.828020][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.836223][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.853173][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.861694][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.869738][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.886611][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.894640][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.901975][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.914599][ T279] device veth0_vlan entered promiscuous mode [ 22.923461][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.932098][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.940844][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.948092][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.955813][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.964477][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.972765][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.980672][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.988905][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.997348][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.005633][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.012832][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.022322][ T275] device veth1_macvtap entered promiscuous mode [ 23.036343][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.044743][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.053019][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.060866][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.070080][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.079161][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.094953][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.103433][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.111296][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.119552][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.127922][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.136146][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.144813][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.153266][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.166461][ T279] device veth1_macvtap entered promiscuous mode [ 23.175827][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.183735][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.192931][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.201770][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.210702][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.226863][ T276] device veth0_vlan entered promiscuous mode [ 23.234451][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 23.245055][ T278] device veth0_vlan entered promiscuous mode [ 23.251409][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.259379][ T277] device veth0_vlan entered promiscuous mode [ 23.273783][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.284968][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.294034][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.302705][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.311201][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.319781][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.328902][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.342518][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.350680][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.359424][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.368186][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.376711][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.385270][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.393448][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.401201][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.409098][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.417157][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.425267][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.439018][ T276] device veth1_macvtap entered promiscuous mode [ 23.457370][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.465834][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.475117][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.483226][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.493726][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.507728][ T278] device veth1_macvtap entered promiscuous mode [ 23.522837][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.531952][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.541296][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.549854][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.558734][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.572513][ T277] device veth1_macvtap entered promiscuous mode [ 23.582065][ T304] device wg2 entered promiscuous mode [ 23.595300][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.613421][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.622087][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.630603][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.639476][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.648244][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.656846][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.693013][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.706439][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.722597][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.734584][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.864964][ T324] cgroup: syz.2.3 (324) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 23.922197][ C0] hrtimer: interrupt took 23813 ns [ 23.956201][ T324] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 24.141521][ T324] device syzkaller0 entered promiscuous mode [ 24.277019][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.284442][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.360459][ T344] device bridge_slave_1 left promiscuous mode [ 24.456876][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.540548][ T344] device bridge_slave_0 left promiscuous mode [ 24.559300][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.652784][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.661363][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.766180][ T351] device bridge_slave_1 left promiscuous mode [ 24.775269][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.811628][ T351] device bridge_slave_0 left promiscuous mode [ 24.823296][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.386089][ T95] udevd[95]: worker [299] terminated by signal 33 (Unknown signal 33) [ 25.400682][ T408] device veth1_to_bond entered promiscuous mode [ 25.422672][ T95] udevd[95]: worker [299] failed while handling '/devices/virtual/block/loop4' [ 25.471904][ T95] udevd[95]: worker [415] terminated by signal 33 (Unknown signal 33) [ 25.492281][ T95] udevd[95]: worker [415] failed while handling '/devices/virtual/block/loop0' [ 25.521035][ T95] udevd[95]: worker [414] terminated by signal 33 (Unknown signal 33) [ 25.572432][ T95] udevd[95]: worker [414] failed while handling '/devices/virtual/block/loop1' [ 25.594924][ T95] udevd[95]: worker [416] terminated by signal 33 (Unknown signal 33) [ 25.638117][ T443] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.645336][ T443] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.659157][ T95] udevd[95]: worker [416] failed while handling '/devices/virtual/block/loop2' [ 25.777854][ T443] device bridge_slave_1 left promiscuous mode [ 25.785405][ T443] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.793680][ T443] device bridge_slave_0 left promiscuous mode [ 25.805947][ T443] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.248717][ T24] kauditd_printk_skb: 45 callbacks suppressed [ 26.248728][ T24] audit: type=1400 audit(1758185957.460:119): avc: denied { create } for pid=465 comm="syz.3.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 26.952277][ T24] audit: type=1400 audit(1758185958.160:120): avc: denied { create } for pid=561 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 27.371727][ T24] audit: type=1400 audit(1758185958.580:121): avc: denied { setopt } for pid=597 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.461607][ T24] audit: type=1400 audit(1758185958.670:122): avc: denied { create } for pid=601 comm="syz.3.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 27.559088][ T604] ref_ctr_offset mismatch. inode: 0x66 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 27.722541][ T624] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.730148][ T624] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.752246][ T623] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.759455][ T623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.766887][ T623] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.774233][ T623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.785471][ T623] device bridge0 entered promiscuous mode [ 27.951167][ T647] syz.0.86 (647) used obsolete PPPIOCDETACH ioctl [ 28.073779][ T678] device sit0 entered promiscuous mode [ 28.542764][ T24] audit: type=1400 audit(1758185959.750:123): avc: denied { create } for pid=727 comm="syz.0.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 28.595220][ T24] audit: type=1400 audit(1758185959.760:124): avc: denied { create } for pid=737 comm="syz.4.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 28.680618][ T24] audit: type=1400 audit(1758185959.800:125): avc: denied { create } for pid=737 comm="syz.4.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 28.879474][ T24] audit: type=1400 audit(1758185960.090:126): avc: denied { create } for pid=769 comm="syz.2.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 28.942257][ T24] audit: type=1400 audit(1758185960.150:127): avc: denied { create } for pid=774 comm="syz.4.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 29.518766][ T24] audit: type=1400 audit(1758185960.730:128): avc: denied { create } for pid=806 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 30.830829][ T890] device pim6reg1 entered promiscuous mode [ 31.052801][ T916] device sit0 left promiscuous mode [ 31.595485][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 31.595496][ T24] audit: type=1400 audit(1758185962.810:132): avc: denied { create } for pid=948 comm="syz.4.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 31.874916][ T956] device sit0 entered promiscuous mode [ 32.300053][ T1006] device wg2 entered promiscuous mode [ 32.525967][ T24] audit: type=1400 audit(1758185963.740:133): avc: denied { create } for pid=1038 comm="syz.0.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 32.821261][ T24] audit: type=1400 audit(1758185964.030:134): avc: denied { create } for pid=1048 comm="syz.0.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 33.523580][ T1100] device pim6reg1 entered promiscuous mode [ 34.116655][ T24] audit: type=1400 audit(1758185965.330:135): avc: denied { create } for pid=1142 comm="syz.1.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 34.402543][ T1152] device pim6reg1 entered promiscuous mode [ 34.490736][ T1160] device veth0_vlan left promiscuous mode [ 34.536779][ T1160] device veth0_vlan entered promiscuous mode [ 34.566894][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.576994][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.595544][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.718297][ T24] audit: type=1400 audit(1758185965.930:136): avc: denied { create } for pid=1167 comm="syz.1.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 34.953042][ T24] audit: type=1400 audit(1758185966.170:137): avc: denied { attach_queue } for pid=1197 comm="syz.0.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 35.330893][ T24] audit: type=1400 audit(1758185966.540:138): avc: denied { create } for pid=1225 comm="syz.4.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 35.767320][ T1253] syz.2.251 uses obsolete (PF_INET,SOCK_PACKET) [ 35.821496][ T24] audit: type=1400 audit(1758185967.030:139): avc: denied { create } for pid=1252 comm="syz.2.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 36.087108][ T1260] : renamed from pim6reg1 [ 36.315835][ T24] audit: type=1400 audit(1758185967.530:140): avc: denied { create } for pid=1264 comm="syz.1.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 36.437637][ T24] audit: type=1400 audit(1758185967.550:141): avc: denied { create } for pid=1276 comm="syz.3.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 36.969218][ T1339] device syzkaller0 entered promiscuous mode [ 37.358805][ T1356] device syzkaller0 entered promiscuous mode [ 37.795336][ T1449] device wg2 left promiscuous mode [ 37.810695][ T1446] device sit0 entered promiscuous mode [ 38.032650][ T1467] device wg2 entered promiscuous mode [ 38.174997][ T1479] device syzkaller0 entered promiscuous mode [ 38.508650][ T24] audit: type=1400 audit(1758185969.720:142): avc: denied { create } for pid=1507 comm="syz.2.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 38.576019][ T1519] device wg2 left promiscuous mode [ 38.597316][ T24] audit: type=1400 audit(1758185969.810:143): avc: denied { create } for pid=1520 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 38.661492][ T1519] device syzkaller0 entered promiscuous mode [ 39.679875][ T1573] device syzkaller0 entered promiscuous mode [ 40.258048][ T1617] device sit0 entered promiscuous mode [ 40.958718][ T1662] ref_ctr_offset mismatch. inode: 0x1bb offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 40.992737][ T1660] device sit0 entered promiscuous mode [ 41.173067][ T1662] GPL: port 1(erspan0) entered blocking state [ 41.179546][ T1662] GPL: port 1(erspan0) entered disabled state [ 41.192486][ T1662] device erspan0 entered promiscuous mode [ 41.215359][ T1665] GPL: port 1(erspan0) entered blocking state [ 41.221582][ T1665] GPL: port 1(erspan0) entered forwarding state [ 41.294258][ T1669] device pim6reg1 entered promiscuous mode [ 41.426586][ T24] audit: type=1400 audit(1758185972.640:144): avc: denied { create } for pid=1679 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 42.783136][ T1753] device pim6reg1 entered promiscuous mode [ 42.808709][ T24] audit: type=1400 audit(1758185974.020:145): avc: denied { create } for pid=1754 comm="syz.2.381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 42.947986][ T1760] ------------[ cut here ]------------ [ 42.957869][ T1760] trace type BPF program uses run-time allocation [ 42.993118][ T1760] WARNING: CPU: 1 PID: 1760 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 43.014780][ T24] audit: type=1400 audit(1758185974.230:146): avc: denied { create } for pid=1763 comm="syz.2.384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 43.060214][ T1760] Modules linked in: [ 43.083544][ T1760] CPU: 1 PID: 1760 Comm: syz.3.382 Not tainted syzkaller #0 [ 43.123208][ T1760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 43.169020][ T1760] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 43.183205][ T1760] Code: 85 e9 14 fe ff ff e8 b9 fa ef ff 31 c0 e9 15 fe ff ff e8 ad fa ef ff c6 05 64 c4 2c 05 01 48 c7 c7 e0 77 05 85 e8 ea 84 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 43.223498][ T1760] RSP: 0018:ffffc90007a97468 EFLAGS: 00010246 [ 43.229933][ T1760] RAX: 397f91ff20809700 RBX: 0000000000000001 RCX: 0000000000080000 [ 43.275613][ T1760] RDX: ffffc90003d15000 RSI: 0000000000002333 RDI: 0000000000002334 [ 43.311195][ T1760] RBP: ffffc90007a974b0 R08: dffffc0000000000 R09: ffffed103ee2a5f8 [ 43.349921][ T1760] R10: ffffed103ee2a5f8 R11: 1ffff1103ee2a5f7 R12: ffff88811a22c000 [ 43.370294][ T1760] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810c982800 [ 43.378819][ T1760] FS: 00007f4756ac36c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 43.391495][ T1760] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 43.421708][ T1760] CR2: 00007fc1b4bb4f98 CR3: 0000000116b15000 CR4: 00000000003506b0 [ 43.430909][ T1760] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 43.450832][ T1760] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 43.486136][ T1760] Call Trace: [ 43.489752][ T1760] ? __fdget+0x1a1/0x230 [ 43.505811][ T1760] resolve_pseudo_ldimm64+0x526/0x1020 [ 43.511582][ T1760] ? bpf_check+0xd680/0xd680 [ 43.528257][ T1760] ? bpf_check+0x765e/0xd680 [ 43.534096][ T1760] bpf_check+0x8d4b/0xd680 [ 43.538956][ T1760] ? bpf_get_btf_vmlinux+0x60/0x60 [ 43.572708][ T1760] ? is_bpf_text_address+0x177/0x190 [ 43.588643][ T1760] ? selinux_bpf_prog_alloc+0x51/0x140 [ 43.594560][ T1760] ? __kernel_text_address+0xa0/0x100 [ 43.610450][ T1760] ? unwind_get_return_address+0x4d/0x90 [ 43.616426][ T1760] ? stack_trace_save+0xe0/0xe0 [ 43.621522][ T1760] ? arch_stack_walk+0xee/0x140 [ 43.631745][ T1760] ? stack_trace_save+0x98/0xe0 [ 43.641775][ T1760] ? stack_trace_snprint+0xf0/0xf0 [ 43.648789][ T1760] ? __kasan_slab_alloc+0x69/0xf0 [ 43.667160][ T1760] ? ttwu_do_activate+0x1e2/0x2b0 [ 43.684431][ T1760] ? selinux_bpf_prog_alloc+0x51/0x140 [ 43.694542][ T1760] ? kvm_sched_clock_read+0x18/0x40 [ 43.712429][ T1760] ? sched_clock+0x3a/0x40 [ 43.717061][ T1760] ? sched_clock_cpu+0x1b/0x3d0 [ 43.727214][ T1760] ? sched_clock+0x3a/0x40 [ 43.735855][ T1760] ? sched_clock_cpu+0x1b/0x3d0 [ 43.741342][ T1760] ? __irq_exit_rcu+0x40/0x150 [ 43.754647][ T1760] ? irq_exit_rcu+0x9/0x10 [ 43.759168][ T1760] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 43.775355][ T1760] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 43.787373][ T1760] ? memset+0x35/0x40 [ 43.791397][ T1760] ? bpf_obj_name_cpy+0x193/0x1e0 [ 43.802147][ T1760] bpf_prog_load+0xf5a/0x1420 [ 43.811339][ T1760] ? map_freeze+0x320/0x320 [ 43.819300][ T1760] ? selinux_bpf+0xc7/0xf0 [ 43.828260][ T1760] ? security_bpf+0x82/0xa0 [ 43.836305][ T1760] __se_sys_bpf+0x442/0x680 [ 43.846955][ T1760] ? __x64_sys_bpf+0x90/0x90 [ 43.857192][ T1760] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 43.868013][ T1760] ? debug_smp_processor_id+0x17/0x20 [ 43.877934][ T1760] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 43.887383][ T1760] __x64_sys_bpf+0x7b/0x90 [ 43.896507][ T1760] do_syscall_64+0x31/0x40 [ 43.903193][ T1760] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.911412][ T1760] RIP: 0033:0x7f475805aba9 [ 43.922629][ T1760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.957824][ T1760] RSP: 002b:00007f4756ac3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 43.970714][ T1760] RAX: ffffffffffffffda RBX: 00007f47582a1fa0 RCX: 00007f475805aba9 [ 43.984921][ T1760] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 43.998567][ T1760] RBP: 00007f47580dde19 R08: 0000000000000000 R09: 0000000000000000 [ 44.030619][ T1760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 44.063860][ T1760] R13: 00007f47582a2038 R14: 00007f47582a1fa0 R15: 00007fff28c9b2f8 [ 44.097911][ T1760] ---[ end trace ec83b57cfe9fa9e0 ]--- [ 44.452080][ T1822] device syzkaller0 entered promiscuous mode [ 46.254933][ T1893] device syzkaller0 entered promiscuous mode [ 46.537103][ T1917] ±ÿ: renamed from team_slave_1 [ 46.671410][ T1920] device wg2 left promiscuous mode [ 46.708701][ T1920] device wg2 entered promiscuous mode [ 46.816947][ T1938] syz.3.435[1938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.817005][ T1938] syz.3.435[1938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.911441][ T1938] device veth0_vlan left promiscuous mode [ 46.936427][ T1938] device veth0_vlan entered promiscuous mode [ 46.973830][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.984676][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.995925][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.061183][ T24] audit: type=1400 audit(1758185978.270:147): avc: denied { tracepoint } for pid=1967 comm="syz.2.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 47.170438][ T24] audit: type=1400 audit(1758185978.380:148): avc: denied { create } for pid=1970 comm="syz.0.444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 47.325058][ T1981] device syzkaller0 entered promiscuous mode [ 48.361062][ T2023] device syzkaller0 entered promiscuous mode [ 48.613156][ T24] audit: type=1400 audit(1758185979.830:149): avc: denied { create } for pid=2075 comm="syz.0.474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 49.620749][ T2125] device sit0 left promiscuous mode [ 49.742801][ T2129] device sit0 entered promiscuous mode [ 50.193732][ T2163] device veth0_vlan left promiscuous mode [ 50.200034][ T2163] device veth0_vlan entered promiscuous mode [ 51.259609][ T2190] ÿÿÿÿÿÿ: renamed from vlan1 [ 52.372945][ T95] udevd[95]: worker [449] terminated by signal 33 (Unknown signal 33) [ 52.393599][ T95] udevd[95]: worker [449] failed while handling '/devices/virtual/block/loop3' [ 52.654156][ T2280] syzkaller0: refused to change device tx_queue_len [ 53.390434][ T2312] syz.1.541[2312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.390491][ T2312] syz.1.541[2312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.427796][ T2311] syz.1.541[2311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.535353][ T2328] device veth0_vlan left promiscuous mode [ 53.566225][ T2328] device veth0_vlan entered promiscuous mode [ 53.573655][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.592442][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.640499][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.140436][ T2360] ±ÿ: renamed from team_slave_1 [ 54.976125][ T2375] device sit0 left promiscuous mode [ 55.079119][ T2379] device syzkaller0 entered promiscuous mode [ 55.086562][ T2378] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.093957][ T2378] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.114134][ T24] audit: type=1400 audit(1758185986.330:150): avc: denied { create } for pid=2393 comm="syz.2.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 55.261708][ T2394] : port 1(erspan0) entered blocking state [ 55.272372][ T2394] : port 1(erspan0) entered disabled state [ 55.282113][ T2394] device erspan0 entered promiscuous mode [ 55.461129][ T2434] syz.2.575[2434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.461187][ T2434] syz.2.575[2434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.579392][ T2439] device wg2 entered promiscuous mode [ 55.731248][ T2444] syzkaller0: create flow: hash 4010829895 index 1 [ 55.739743][ T295] syzkaller0: tun_net_xmit 76 [ 55.744546][ T24] audit: type=1400 audit(1758185986.960:151): avc: denied { create } for pid=2446 comm="syz.4.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 55.764513][ C1] syzkaller0: tun_net_xmit 76 [ 55.769831][ T295] syzkaller0: tun_net_xmit 48 [ 55.794704][ T2443] syzkaller0: delete flow: hash 4010829895 index 1 [ 56.818559][ T2523] device syzkaller0 entered promiscuous mode [ 57.316917][ T24] audit: type=1400 audit(1758185988.530:152): avc: denied { create } for pid=2544 comm="syz.1.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 57.428598][ T2551] device pim6reg1 entered promiscuous mode [ 57.947877][ T2581] syz.3.615[2581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.947977][ T2581] syz.3.615[2581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.218754][ T24] audit: type=1400 audit(1758185989.430:153): avc: denied { read } for pid=2592 comm="syz.1.618" name="cgroup.subtree_control" dev="cgroup2" ino=369 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 60.027079][ T2682] device syzkaller0 entered promiscuous mode [ 60.309918][ T2684] device sit0 left promiscuous mode [ 60.754534][ T2715] device pim6reg1 entered promiscuous mode [ 61.456779][ T2742] device pim6reg1 entered promiscuous mode [ 62.118625][ T2790] device veth0_vlan left promiscuous mode [ 62.163970][ T2790] device veth0_vlan entered promiscuous mode [ 62.332381][ T2812] device pim6reg1 entered promiscuous mode [ 63.056319][ T2844] device syzkaller0 entered promiscuous mode [ 63.437697][ T2884] device sit0 left promiscuous mode [ 63.493353][ T2896] device syzkaller0 entered promiscuous mode [ 64.154602][ T2916] device sit0 entered promiscuous mode [ 64.381443][ T24] audit: type=1400 audit(1758185995.590:154): avc: denied { create } for pid=2939 comm="syz.1.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 64.896315][ T2961] device syzkaller0 entered promiscuous mode [ 65.334176][ T24] audit: type=1400 audit(1758185996.550:155): avc: denied { create } for pid=2980 comm="syz.2.732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 66.328527][ T3010] device syzkaller0 entered promiscuous mode [ 67.258935][ T24] audit: type=1400 audit(1758185998.470:156): avc: denied { create } for pid=3066 comm="syz.2.752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 68.012377][ T24] audit: type=1400 audit(1758185999.230:157): avc: denied { read } for pid=3081 comm="syz.2.758" dev="nsfs" ino=4026532568 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 68.302370][ T24] audit: type=1400 audit(1758185999.230:158): avc: denied { open } for pid=3081 comm="syz.2.758" path="net:[4026532568]" dev="nsfs" ino=4026532568 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 68.652540][ T3105] device pim6reg1 entered promiscuous mode [ 69.649507][ T3166] device syzkaller0 entered promiscuous mode [ 69.669540][ T24] audit: type=1400 audit(1758186000.880:159): avc: denied { ioctl } for pid=3173 comm="syz.1.778" path="pid:[4026532282]" dev="nsfs" ino=4026532282 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 69.764971][ T3175] device wg2 entered promiscuous mode [ 70.212121][ T3200] ªªªªªª: renamed from vlan0 [ 70.403869][ T3206] device syzkaller0 entered promiscuous mode [ 70.583734][ T3208] GPL: port 1(erspan0) entered blocking state [ 70.593677][ T3208] GPL: port 1(erspan0) entered disabled state [ 70.614212][ T3208] device erspan0 entered promiscuous mode [ 70.648099][ T3210] GPL: port 1(erspan0) entered blocking state [ 70.654249][ T3210] GPL: port 1(erspan0) entered forwarding state [ 70.693726][ T3213] device veth0_vlan left promiscuous mode [ 70.710065][ T3213] device veth0_vlan entered promiscuous mode [ 70.727318][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.741439][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 70.757966][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.223630][ T95] udevd[95]: worker [3109] terminated by signal 33 (Unknown signal 33) [ 71.240012][ T3256] device veth0_vlan left promiscuous mode [ 71.249831][ T95] udevd[95]: worker [3109] failed while handling '/devices/virtual/block/loop0' [ 71.307986][ T3256] device veth0_vlan entered promiscuous mode [ 71.373689][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.394129][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 71.415347][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.646631][ T3277] device sit0 left promiscuous mode [ 72.596800][ T3369] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 72.880441][ T3381] device syzkaller0 entered promiscuous mode [ 73.110009][ T3404] device veth0_vlan left promiscuous mode [ 73.121316][ T3404] device veth0_vlan entered promiscuous mode [ 73.489662][ T3432] syz.1.859[3432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.490041][ T3432] syz.1.859[3432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.501783][ T3432] syz.1.859[3432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.523703][ T3434] syz.1.859[3434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.536592][ T3434] syz.1.859[3434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.664931][ T3484] device pim6reg1 entered promiscuous mode [ 75.435606][ T3501] device pim6reg1 entered promiscuous mode [ 75.562767][ T3507] syz_tun: mtu greater than device maximum [ 75.575602][ T3509] syz_tun: mtu greater than device maximum [ 75.677772][ T3514] device pim6reg1 entered promiscuous mode [ 76.262994][ T3564] device syzkaller0 entered promiscuous mode [ 76.328490][ T3579] ªªªªªª: renamed from vlan0 [ 76.734378][ T3614] device pim6reg1 entered promiscuous mode [ 78.220530][ T3724] device veth1_macvtap left promiscuous mode [ 78.227739][ T3724] device macsec0 entered promiscuous mode [ 78.379634][ T24] audit: type=1400 audit(1758186009.590:160): avc: denied { ioctl } for pid=3729 comm="syz.2.947" path="" dev="cgroup2" ino=129 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 78.700543][ T3743] device veth0_vlan left promiscuous mode [ 78.729232][ T3743] device veth0_vlan entered promiscuous mode [ 78.933292][ T3769] device sit0 entered promiscuous mode [ 79.474149][ T3824] device wg2 left promiscuous mode [ 79.502357][ T3824] device wg2 entered promiscuous mode [ 80.397422][ T3886] device wg2 left promiscuous mode [ 80.502092][ T3891] syz.1.997[3891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.502238][ T3891] syz.1.997[3891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.602590][ T3886] device syzkaller0 entered promiscuous mode [ 80.832759][ T3896] device syzkaller0 entered promiscuous mode [ 80.923582][ T24] audit: type=1400 audit(1758186012.140:161): avc: denied { create } for pid=3912 comm="syz.0.1004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 80.968081][ T3913] device pim6reg1 entered promiscuous mode [ 81.439044][ T3924] device syzkaller0 entered promiscuous mode [ 82.397927][ T3984] device syzkaller0 entered promiscuous mode [ 82.623937][ T4006] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 82.669791][ T4006] device syzkaller0 entered promiscuous mode [ 82.917588][ T4028] device wg2 entered promiscuous mode [ 83.614949][ T24] audit: type=1400 audit(1758186014.830:162): avc: denied { create } for pid=4074 comm="syz.3.1052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 84.734840][ T4162] device wg2 left promiscuous mode [ 84.964624][ T4183] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 85.037128][ T4183] device syzkaller0 entered promiscuous mode [ 85.207727][ T4213] syz.3.1088[4213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.297348][ T4213] device veth0_vlan left promiscuous mode [ 85.329030][ T4213] device veth0_vlan entered promiscuous mode [ 85.350854][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.363822][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.379257][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 85.828929][ T4288] device veth0_vlan left promiscuous mode [ 85.837157][ T4288] device veth0_vlan entered promiscuous mode [ 86.526024][ T4358] device syzkaller0 entered promiscuous mode [ 86.659504][ T24] audit: type=1400 audit(1758186017.870:163): avc: denied { append } for pid=4360 comm="syz.1.1131" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 86.788929][ T4367] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.796780][ T4367] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.808170][ T4367] device bridge0 left promiscuous mode [ 87.098561][ T4379] device syzkaller0 entered promiscuous mode [ 88.680811][ T4467] device syzkaller0 entered promiscuous mode [ 89.359831][ T4533] ªªªªªª: renamed from vlan0 [ 90.148034][ T4587] syz.2.1193[4587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.148448][ T4587] syz.2.1193[4587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.486059][ T4610] device syzkaller0 entered promiscuous mode [ 90.982193][ T4638] device pim6reg1 entered promiscuous mode [ 91.978397][ T4704] device wg2 left promiscuous mode [ 92.083069][ T4703] device wg2 entered promiscuous mode [ 93.341325][ T4784] device pim6reg1 entered promiscuous mode [ 93.897335][ T4803] device sit0 left promiscuous mode [ 94.897080][ T4850] device syzkaller0 entered promiscuous mode [ 96.081208][ T4952] ±ÿ: renamed from team_slave_1 [ 96.220957][ T4982] device pim6reg1 entered promiscuous mode [ 96.491195][ T4987] device syzkaller0 entered promiscuous mode [ 97.605389][ T5091] device sit0 entered promiscuous mode [ 98.474998][ T5148] device sit0 entered promiscuous mode [ 98.664720][ T5164] device wg2 left promiscuous mode [ 98.671328][ T5170] device wg2 entered promiscuous mode [ 99.641194][ T5197] device syzkaller0 entered promiscuous mode [ 100.175833][ T5236] device syzkaller0 entered promiscuous mode [ 100.665140][ T5292] syz.3.1396[5292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.665211][ T5292] syz.3.1396[5292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.735484][ T5299] device syzkaller0 entered promiscuous mode [ 100.951414][ T24] audit: type=1400 audit(1758186032.160:164): avc: denied { create } for pid=5314 comm="syz.2.1405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 100.957378][ T5315] device sit0 entered promiscuous mode [ 101.144340][ T5323] device pim6reg1 entered promiscuous mode [ 101.205946][ T5332] device syzkaller0 entered promiscuous mode [ 101.336252][ T5334] tap0: tun_chr_ioctl cmd 35108 [ 102.024352][ T5387] device pim6reg1 entered promiscuous mode [ 102.567246][ T277] cgroup: fork rejected by pids controller in /syz0 [ 103.169675][ T5429] device syzkaller0 entered promiscuous mode [ 103.693997][ T5431] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.745613][ T5431] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.753578][ T5431] device bridge_slave_0 entered promiscuous mode [ 103.792236][ T5431] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.806145][ T5431] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.822778][ T5431] device bridge_slave_1 entered promiscuous mode [ 103.839796][ T5457] bridge0: port 3(gretap0) entered blocking state [ 103.846949][ T5457] bridge0: port 3(gretap0) entered disabled state [ 103.863284][ T5457] device gretap0 entered promiscuous mode [ 103.990523][ T24] audit: type=1400 audit(1758186035.200:165): avc: denied { create } for pid=5431 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.038224][ T24] audit: type=1400 audit(1758186035.230:166): avc: denied { write } for pid=5431 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.142610][ T24] audit: type=1400 audit(1758186035.230:167): avc: denied { read } for pid=5431 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.374155][ T5467] device syzkaller0 entered promiscuous mode [ 104.448088][ T5491] device sit0 left promiscuous mode [ 104.465106][ T5492] device sit0 entered promiscuous mode [ 104.709988][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 104.723963][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 104.743362][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 104.756265][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 104.778744][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.785955][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.799062][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 104.927584][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 104.936123][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 104.944701][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.951910][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.024792][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 105.039856][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.057317][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 105.074350][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.115642][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 105.132711][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 105.205733][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 105.218329][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.247408][ T5431] device veth0_vlan entered promiscuous mode [ 105.264058][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.274778][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.371486][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 105.380211][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.391778][ T5431] device veth1_macvtap entered promiscuous mode [ 105.427776][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.440285][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 105.469212][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.519940][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 105.567053][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.679719][ T296] GPL: port 1(erspan0) entered disabled state [ 105.712994][ T296] device erspan0 left promiscuous mode [ 105.736137][ T296] GPL: port 1(erspan0) entered disabled state [ 106.051266][ T5600] device syzkaller0 entered promiscuous mode [ 106.154863][ T296] device veth1_macvtap left promiscuous mode [ 107.603091][ T5696] device macsec0 entered promiscuous mode [ 108.697478][ T5732] device syzkaller0 entered promiscuous mode [ 108.919767][ T5758] device syzkaller0 entered promiscuous mode [ 109.109464][ T5777] syz.0.1531[5777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.109516][ T5777] syz.0.1531[5777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.376678][ T5792] device syzkaller0 entered promiscuous mode [ 109.855088][ T5816] device pim6reg1 entered promiscuous mode [ 109.919787][ T5821] device syzkaller0 entered promiscuous mode [ 110.519902][ T5880] device pim6reg1 entered promiscuous mode [ 110.919171][ T5906] device veth0_vlan left promiscuous mode [ 110.931022][ T5906] device veth0_vlan entered promiscuous mode [ 110.947565][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.964262][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 110.982457][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.125188][ T5925] syz.3.1575[5925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.125250][ T5925] syz.3.1575[5925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.757880][ T5958] device bridge_slave_1 left promiscuous mode [ 111.780798][ T5958] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.796500][ T5958] device bridge_slave_0 left promiscuous mode [ 111.804365][ T5958] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.117407][ T5994] device pim6reg1 entered promiscuous mode [ 113.820643][ T6034] device syzkaller0 entered promiscuous mode [ 113.916149][ T6049] device sit0 entered promiscuous mode [ 114.371957][ T6095] device sit0 left promiscuous mode [ 114.400116][ T6095] device sit0 entered promiscuous mode [ 114.461333][ T6094] device sit0 left promiscuous mode [ 115.436653][ T6150] device veth1_macvtap left promiscuous mode [ 115.447140][ T6150] device macsec0 entered promiscuous mode [ 115.952045][ T6177] syz.3.1651[6177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.954079][ T6177] syz.3.1651[6177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.010102][ T6174] device syzkaller0 entered promiscuous mode [ 116.115731][ T6180] syz.3.1651[6180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.115790][ T6180] syz.3.1651[6180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.178385][ T6179] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 116.301844][ T6179] syzkaller0: Linktype set failed because interface is up [ 116.347143][ T1376] syzkaller0: tun_net_xmit 48 [ 117.178159][ T6230] device wg2 left promiscuous mode [ 117.761372][ T6265] device syzkaller0 entered promiscuous mode [ 117.989060][ T6300] device pim6reg1 entered promiscuous mode [ 118.539945][ T6323] device syzkaller0 entered promiscuous mode [ 118.711457][ T6356] device sit0 left promiscuous mode [ 118.841791][ T6370] syz.4.1710[6370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.841904][ T6370] syz.4.1710[6370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.864009][ T6370] syz.4.1710[6370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.880361][ T6370] syz.4.1710[6370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.958948][ T6370] device wg2 entered promiscuous mode [ 119.020452][ T6376] device pim6reg1 entered promiscuous mode [ 119.608000][ T6399] device syzkaller0 entered promiscuous mode [ 119.641216][ T6405] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.648882][ T6405] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.676036][ T6408] device bridge_slave_1 left promiscuous mode [ 119.693061][ T6408] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.703474][ T6408] device bridge_slave_0 left promiscuous mode [ 119.709966][ T6408] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.422784][ T6480] device macsec0 left promiscuous mode [ 120.429039][ T6480] device veth1_macvtap entered promiscuous mode [ 120.435795][ T6480] device macsec0 entered promiscuous mode [ 120.442438][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 121.068516][ T6541] device pim6reg1 entered promiscuous mode [ 122.756311][ T6632] device wg2 left promiscuous mode [ 122.862100][ T6641] device syzkaller0 entered promiscuous mode [ 123.957406][ T6673] tap0: tun_chr_ioctl cmd 1074025677 [ 123.987732][ T6673] tap0: linktype set to 768 [ 125.084044][ T6752] device pim6reg1 entered promiscuous mode [ 126.995561][ T6927] device veth0_vlan left promiscuous mode [ 127.011708][ T6927] device veth0_vlan entered promiscuous mode [ 127.021463][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.033183][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.046101][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 127.412211][ T24] audit: type=1400 audit(1758186058.620:168): avc: denied { create } for pid=6975 comm="syz.2.1886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 127.665462][ T7000] device wg2 left promiscuous mode [ 127.772473][ T7010] device syzkaller0 entered promiscuous mode [ 128.875922][ T7072] device pim6reg1 entered promiscuous mode [ 129.440205][ T24] audit: type=1400 audit(1758186060.650:169): avc: denied { create } for pid=7110 comm="syz.3.1931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 129.852904][ T7158] syz.3.1942[7158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.852963][ T7158] syz.3.1942[7158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.063378][ T7182] device macsec0 entered promiscuous mode [ 130.147574][ T7195] device pim6reg1 entered promiscuous mode [ 130.756043][ T7254] device pim6reg1 entered promiscuous mode [ 131.292918][ T7273] device pim6reg1 entered promiscuous mode [ 131.424873][ T7273] device syzkaller0 entered promiscuous mode [ 132.343365][ T7305] device wg2 entered promiscuous mode [ 132.832346][ T7371] device wg2 entered promiscuous mode [ 132.961894][ T7383] p: renamed from pim6reg1 [ 133.586523][ T7392] device syzkaller0 entered promiscuous mode [ 133.679651][ T7411] ÿÿÿÿÿÿ: renamed from vlan1 [ 134.282847][ T7456] device pim6reg1 entered promiscuous mode [ 134.462506][ T7468] syz.3.2034[7468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.462557][ T7468] syz.3.2034[7468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.489697][ T7466] device syzkaller0 entered promiscuous mode [ 135.856092][ T7525] device syzkaller0 entered promiscuous mode [ 136.039152][ T7548] device veth0_vlan left promiscuous mode [ 136.052543][ T7548] device veth0_vlan entered promiscuous mode [ 136.063156][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.086056][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 136.096024][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.123714][ T7548] device pim6reg1 entered promiscuous mode [ 136.166879][ T7572] device wg2 entered promiscuous mode [ 136.814946][ T7644] device sit0 left promiscuous mode [ 137.004929][ T7645] device sit0 entered promiscuous mode [ 137.073916][ T275] cgroup: fork rejected by pids controller in /syz1 [ 137.497403][ T7680] device syzkaller0 entered promiscuous mode [ 137.555477][ T7683] device veth0_vlan left promiscuous mode [ 137.587149][ T7683] device veth0_vlan entered promiscuous mode [ 137.912894][ T7697] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.937184][ T7697] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.964416][ T7697] device bridge_slave_0 entered promiscuous mode [ 138.005116][ T7738] device syzkaller0 entered promiscuous mode [ 138.012083][ T7697] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.020492][ T7697] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.033946][ T7697] device bridge_slave_1 entered promiscuous mode [ 138.483315][ T7752] device syzkaller0 entered promiscuous mode [ 138.811711][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.821784][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.830631][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.839542][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.851439][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.858658][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.868284][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.876820][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.885462][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.892720][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.900765][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.926339][ T7767] device syzkaller0 entered promiscuous mode [ 138.961934][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.976845][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.000836][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.009078][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.242580][ T7697] device veth0_vlan entered promiscuous mode [ 139.259035][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 139.267791][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.277155][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 139.285248][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.307773][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.321014][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.333662][ T7786] device sit0 left promiscuous mode [ 139.496299][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.524617][ T7697] device veth1_macvtap entered promiscuous mode [ 139.654815][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 139.663259][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 139.831342][ T7796] device syzkaller0 entered promiscuous mode [ 139.871385][ T7811] device veth0_vlan left promiscuous mode [ 139.920801][ T7811] device veth0_vlan entered promiscuous mode [ 139.987221][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 139.999045][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.019435][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.034677][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 140.049452][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.350519][ T7833] device syzkaller0 entered promiscuous mode [ 141.882592][ T7903] device veth1_macvtap left promiscuous mode [ 141.912161][ T7903] device macsec0 left promiscuous mode [ 141.964623][ T7904] device veth1_macvtap entered promiscuous mode [ 141.982697][ T7904] device macsec0 entered promiscuous mode [ 143.820811][ T7931] ÿÿÿÿÿÿ: renamed from vlan1 [ 143.962533][ T7937] device veth0_vlan left promiscuous mode [ 143.977668][ T7937] device veth0_vlan entered promiscuous mode [ 143.990340][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.000311][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.008445][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 144.386219][ T7959] device pim6reg1 entered promiscuous mode [ 144.597569][ T7973] device pim6reg1 entered promiscuous mode [ 144.964637][ T8013] device pim6reg1 entered promiscuous mode [ 145.087948][ T24] audit: type=1400 audit(1758186076.300:170): avc: denied { create } for pid=8031 comm="syz.2.2194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 145.366111][ T8078] device sit0 left promiscuous mode [ 145.429765][ T8078] device sit0 entered promiscuous mode [ 145.491479][ T8095] device wg2 left promiscuous mode [ 145.601549][ T8095] device wg2 entered promiscuous mode [ 145.813574][ T8124] device veth1_macvtap left promiscuous mode [ 145.830426][ T8124] device macsec0 entered promiscuous mode [ 146.013742][ T8143] device syzkaller0 entered promiscuous mode [ 146.061059][ T8143] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 147.377250][ T24] audit: type=1400 audit(1758186078.590:171): avc: denied { setattr } for pid=8200 comm="syz.2.2243" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 147.719990][ T8221] device veth0_vlan left promiscuous mode [ 147.733016][ T8221] device veth0_vlan entered promiscuous mode [ 148.024263][ T8229] device syzkaller0 entered promiscuous mode [ 148.243209][ T8251] ÿÿÿÿÿÿ: renamed from vlan1 [ 148.289203][ T8266] device veth0_vlan left promiscuous mode [ 148.305511][ T8266] device veth0_vlan entered promiscuous mode [ 150.068430][ T8380] device syzkaller0 entered promiscuous mode [ 150.688349][ T24] audit: type=1400 audit(1758186081.900:172): avc: denied { create } for pid=8419 comm="syz.3.2304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 152.065968][ T8470] device pim6reg1 entered promiscuous mode [ 152.702593][ T8535] device syzkaller0 entered promiscuous mode [ 153.950344][ T8673] device syzkaller0 entered promiscuous mode [ 154.150701][ T8688] device wg2 entered promiscuous mode [ 154.714464][ T8703] device sit0 entered promiscuous mode [ 154.756461][ T8708] device syzkaller0 entered promiscuous mode [ 155.091244][ T8756] device syzkaller0 entered promiscuous mode [ 155.582289][ T8791] device wg2 entered promiscuous mode [ 155.642726][ T8791] device syzkaller0 entered promiscuous mode [ 157.258059][ T24] audit: type=1400 audit(1758186088.470:173): avc: denied { associate } for pid=8922 comm="syz.3.2454" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 160.353659][ T9089] device wg2 left promiscuous mode [ 161.571405][ T9140] cgroup: fork rejected by pids controller in /syz3 [ 161.970743][ T9164] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 162.023709][ T24] audit: type=1400 audit(1758186093.240:174): avc: denied { mounton } for pid=9180 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 162.156175][ T9182] device veth0_vlan left promiscuous mode [ 162.167660][ T9182] device veth0_vlan entered promiscuous mode [ 162.216495][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.225017][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.232659][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 162.271749][ T9180] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.279976][ T9180] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.311712][ T9180] device bridge_slave_0 entered promiscuous mode [ 162.434621][ T9180] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.452068][ T9180] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.460092][ T9180] device bridge_slave_1 entered promiscuous mode [ 162.621689][ T9191] device syzkaller0 entered promiscuous mode [ 162.747576][ T9216] device wg2 left promiscuous mode [ 163.121356][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.129070][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.150792][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.175342][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.185443][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.192667][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.200812][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.274460][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.285304][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.299387][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.306592][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.316577][ T9237] device veth0_vlan left promiscuous mode [ 163.329569][ T9237] device veth0_vlan entered promiscuous mode [ 163.365092][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.393143][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.464849][ T296] device gretap0 left promiscuous mode [ 163.472175][ T296] bridge0: port 3(gretap0) entered disabled state [ 163.535599][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.561237][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.603950][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.667352][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.727557][ T9180] device veth0_vlan entered promiscuous mode [ 163.767011][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.814412][ T9180] device veth1_macvtap entered promiscuous mode [ 163.918176][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 163.968525][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.984151][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 164.002650][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 164.028454][ T296] device bridge_slave_1 left promiscuous mode [ 164.037085][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.062828][ T296] device bridge_slave_0 left promiscuous mode [ 164.069328][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.087934][ T296] device veth1_macvtap left promiscuous mode [ 164.360933][ T24] audit: type=1400 audit(1758186095.570:175): avc: denied { unmount } for pid=9180 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 166.361741][ T9356] device sit0 entered promiscuous mode [ 166.962974][ T9372] device syzkaller0 entered promiscuous mode [ 169.429078][ T9493] device syzkaller0 entered promiscuous mode [ 169.660490][ T9518] device veth0_vlan left promiscuous mode [ 169.668603][ T9518] device veth0_vlan entered promiscuous mode [ 169.697003][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.716291][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.723976][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 169.864246][ T9551] syz.3.2639[9551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.864327][ T9551] syz.3.2639[9551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.087052][ T9582] syz.2.2650[9582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.135168][ T9582] syz.2.2650[9582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.136243][ T9571] device syzkaller0 entered promiscuous mode [ 170.185645][ T9582] syz.2.2650[9582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.185695][ T9582] syz.2.2650[9582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.066506][ T9631] device wg2 entered promiscuous mode [ 171.327791][ T9665] device veth0_vlan left promiscuous mode [ 171.380334][ T9665] device veth0_vlan entered promiscuous mode [ 171.415379][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.429152][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 171.499373][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.920632][ T9667] device syzkaller0 entered promiscuous mode [ 172.410200][ T24] audit: type=1400 audit(1758186103.620:176): avc: denied { create } for pid=9731 comm="syz.4.2691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 172.808038][ T9754] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.815736][ T9754] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.823342][ T9754] device bridge_slave_0 entered promiscuous mode [ 172.842257][ T9754] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.875948][ T9754] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.883807][ T9754] device bridge_slave_1 entered promiscuous mode [ 173.107566][ T9762] device veth0_vlan left promiscuous mode [ 173.143159][ T9762] device veth0_vlan entered promiscuous mode [ 173.607088][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.682544][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.863196][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 173.919662][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.942698][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.951025][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.958102][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.965719][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.975304][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.983924][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.991102][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.998980][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.007935][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.027295][ T9754] device veth0_vlan entered promiscuous mode [ 174.113409][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.126282][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.134074][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.141575][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.459903][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 174.471753][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 174.485989][ T9754] device veth1_macvtap entered promiscuous mode [ 174.555569][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 174.563685][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 174.574308][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 174.603432][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 174.621973][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 174.926872][ T9820] bridge0: port 3(veth1) entered blocking state [ 174.936113][ T9820] bridge0: port 3(veth1) entered disabled state [ 174.945599][ T9827] syz.4.2717[9827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.945678][ T9827] syz.4.2717[9827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.961535][ T9820] device veth1 entered promiscuous mode [ 174.993507][ T9820] bridge0: port 3(veth1) entered blocking state [ 174.999998][ T9820] bridge0: port 3(veth1) entered forwarding state [ 175.054363][ T9829] device macsec0 entered promiscuous mode [ 175.413550][ T296] device erspan0 left promiscuous mode [ 175.479965][ T296] : port 1(erspan0) entered disabled state [ 175.727018][ T296] device veth0_vlan left promiscuous mode [ 176.937534][ T9912] device veth0_vlan left promiscuous mode [ 176.960638][ T9912] device veth0_vlan entered promiscuous mode [ 177.000515][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.013509][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.029882][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 177.098694][ T9914] €Â0: renamed from pim6reg1 [ 177.433025][ T9947] syz.0.2753[9947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.433126][ T9947] syz.0.2753[9947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.478029][ T9947] device pim6reg1 entered promiscuous mode [ 179.920560][T10106] device erspan0 left promiscuous mode [ 179.942925][T10106] GPL: port 1(erspan0) entered disabled state [ 181.443470][T10193] device sit0 left promiscuous mode [ 181.615051][T10194] device sit0 entered promiscuous mode [ 181.844529][T10200] device pim6reg1 entered promiscuous mode [ 182.029593][T10237] device pim6reg1 entered promiscuous mode [ 182.420318][T10267] device syzkaller0 entered promiscuous mode [ 184.131204][T10319] device wg2 entered promiscuous mode [ 186.808830][T10369] gretap0: refused to change device tx_queue_len [ 186.954700][T10384] device syzkaller0 entered promiscuous mode [ 187.339717][T10406] device wg2 entered promiscuous mode [ 187.753282][T10429] device syzkaller0 entered promiscuous mode [ 187.977062][T10441] device wg2 entered promiscuous mode [ 188.393732][T10462] device syzkaller0 entered promiscuous mode [ 188.989803][T10480] device sit0 left promiscuous mode [ 190.430917][T10562] device pim6reg1 entered promiscuous mode [ 191.323662][T10625] device syzkaller0 entered promiscuous mode [ 191.848870][T10644] device syzkaller0 entered promiscuous mode [ 191.879246][T10648] device pim6reg1 entered promiscuous mode [ 191.953182][T10665] device wg2 left promiscuous mode [ 191.961701][T10665] device wg2 entered promiscuous mode [ 192.268627][T10685] device wg2 entered promiscuous mode [ 192.533825][T10718] device syzkaller0 entered promiscuous mode [ 192.957935][T10743] device pim6reg1 entered promiscuous mode [ 193.389638][T10760] device syzkaller0 entered promiscuous mode [ 194.965350][T10799] device pim6reg1 entered promiscuous mode [ 195.139838][T10812] GPL: port 1(erspan0) entered blocking state [ 195.148977][T10812] GPL: port 1(erspan0) entered disabled state [ 195.155691][T10812] device erspan0 entered promiscuous mode [ 195.218757][T10806] GPL: port 1(erspan0) entered blocking state [ 195.225162][T10806] GPL: port 1(erspan0) entered forwarding state [ 196.129473][T10854] syz.0.3013[10854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.129564][T10854] syz.0.3013[10854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.172377][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 197.641863][T10945] device sit0 left promiscuous mode [ 197.778733][T10949] device sit0 entered promiscuous mode [ 197.889557][T10958] device pim6reg1 entered promiscuous mode [ 198.533060][T11003] device syzkaller0 entered promiscuous mode [ 198.889991][T11029] syz.3.3067[11029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.890077][T11029] syz.3.3067[11029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.973559][T11029] device pim6reg1 entered promiscuous mode [ 199.944312][T11108] syz.3.3092[11108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.944387][T11108] syz.3.3092[11108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.043700][T11125] device pim6reg1 entered promiscuous mode [ 200.719981][T11137] device wg2 left promiscuous mode [ 200.763935][T11137] syz.1.3102[11137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.763981][T11137] syz.1.3102[11137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.804248][T11156] device wg2 entered promiscuous mode [ 200.942173][T11174] device veth1_macvtap left promiscuous mode [ 201.064499][T11199] device sit0 entered promiscuous mode [ 201.985719][T11260] device pim6reg1 entered promiscuous mode [ 203.225102][T11292] device sit0 entered promiscuous mode [ 203.684407][T11366] device sit0 entered promiscuous mode [ 204.042650][T11383] device pim6reg1 entered promiscuous mode [ 204.384908][T11406] device wg2 left promiscuous mode [ 204.399288][T11406] device wg2 entered promiscuous mode [ 205.071110][T11468] device sit0 entered promiscuous mode [ 205.242652][T11441] device pim6reg1 entered promiscuous mode [ 205.401280][T11470] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.429587][T11470] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.464548][T11470] device bridge_slave_0 entered promiscuous mode [ 205.493506][T11488] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.501083][T11488] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.551718][T11470] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.576568][T11470] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.592825][T11470] device bridge_slave_1 entered promiscuous mode [ 205.941813][T11505] device syzkaller0 entered promiscuous mode [ 206.102046][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.117221][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.147028][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.204411][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.222010][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.229115][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.258796][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.272942][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.283450][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.291944][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.299273][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.330413][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.365374][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.422966][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.447784][T11470] device veth0_vlan entered promiscuous mode [ 206.462304][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.474918][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.484026][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.499113][T11470] device veth1_macvtap entered promiscuous mode [ 206.522835][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.595954][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.615335][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.766388][T11569] device syzkaller0 entered promiscuous mode [ 207.386644][ T296] device veth1_macvtap left promiscuous mode [ 207.393690][ T296] device veth0_vlan left promiscuous mode [ 207.543693][T11605] device pim6reg1 entered promiscuous mode [ 207.793232][T11615] device syzkaller0 entered promiscuous mode [ 208.560827][T11669] device pim6reg1 entered promiscuous mode [ 208.772432][T11682] device syzkaller0 entered promiscuous mode [ 209.523154][T11739] device syzkaller0 entered promiscuous mode [ 210.381517][T11766] device syzkaller0 entered promiscuous mode [ 210.422058][T11770] device wg2 left promiscuous mode [ 211.334183][T11797] syz.2.3295[11797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.334246][T11797] syz.2.3295[11797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.078113][T11861] device wg2 left promiscuous mode [ 212.138479][T11864] device syzkaller0 entered promiscuous mode [ 212.477831][T11888] device syzkaller0 entered promiscuous mode [ 212.951953][T11925] device pim6reg1 entered promiscuous mode [ 214.249710][T12014] device pim6reg1 entered promiscuous mode [ 215.205798][T12049] device veth0_vlan left promiscuous mode [ 215.216318][T12049] device veth0_vlan entered promiscuous mode [ 215.300549][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.312891][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.322571][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.775138][T12097] device syzkaller0 entered promiscuous mode [ 216.028850][T12143] device pim6reg1 entered promiscuous mode [ 216.641996][T12165] device pim6reg1 entered promiscuous mode [ 217.177954][T12202] device wg2 left promiscuous mode [ 217.218832][T12202] device wg2 entered promiscuous mode [ 217.868303][T12216] device syzkaller0 entered promiscuous mode [ 218.165019][T12259] device syzkaller0 entered promiscuous mode [ 218.277019][T12268] device sit0 left promiscuous mode [ 218.312164][T12268] device sit0 entered promiscuous mode [ 218.473728][T12284] syz.0.3437[12284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.473786][T12284] syz.0.3437[12284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.508406][T12284] device veth0_vlan left promiscuous mode [ 218.528606][T12284] device veth0_vlan entered promiscuous mode [ 218.543393][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.555116][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.584625][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 219.398695][T12326] device syzkaller0 entered promiscuous mode [ 220.704334][T12434] device sit0 left promiscuous mode [ 220.931581][T12440] device veth0_vlan left promiscuous mode [ 220.944333][T12440] device veth0_vlan entered promiscuous mode [ 220.991866][T12450] device sit0 left promiscuous mode [ 221.184375][T12450] device sit0 entered promiscuous mode [ 221.476279][T12470] device sit0 left promiscuous mode [ 221.507220][T12470] device sit0 entered promiscuous mode [ 222.227708][T12518] device pim6reg1 entered promiscuous mode [ 222.565838][T12581] ªªªªªª: renamed from vlan0 [ 222.844742][T12605] device syzkaller0 entered promiscuous mode [ 222.871275][T12549] cgroup: fork rejected by pids controller in /syz2 [ 223.108583][T12630] device veth0_vlan left promiscuous mode [ 223.125332][T12630] device veth0_vlan entered promiscuous mode [ 223.158076][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 223.181527][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 223.204709][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 223.244992][T12633] device veth1_macvtap left promiscuous mode [ 223.353252][T12638] device veth1_macvtap entered promiscuous mode [ 223.368399][T12638] device macsec0 entered promiscuous mode [ 223.630528][T12663] device syzkaller0 entered promiscuous mode [ 224.938944][T12738] device sit0 left promiscuous mode [ 225.133353][T12743] device sit0 entered promiscuous mode [ 225.344065][T12759] device wg2 entered promiscuous mode [ 226.891971][T12850] syz.4.3591[12850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.892026][T12850] syz.4.3591[12850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.910701][T12850] syz.4.3591[12850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.930260][T12850] syz.4.3591[12850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.990291][T12851] device wg2 entered promiscuous mode [ 227.578584][T12884] device sit0 entered promiscuous mode [ 227.955939][T12919] device syzkaller0 entered promiscuous mode [ 228.037672][T12920] device wg2 left promiscuous mode [ 228.180110][T12939] device sit0 left promiscuous mode [ 228.501440][T12945] device sit0 entered promiscuous mode [ 228.641789][T12969] device syzkaller0 entered promiscuous mode [ 228.896108][T12990] device wg2 left promiscuous mode [ 228.935274][T12990] device wg2 entered promiscuous mode [ 228.985390][T12995] device wg2 left promiscuous mode [ 229.009559][T13006] syz.0.3634[13006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.009616][T13006] syz.0.3634[13006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.194902][T13006] device wg2 entered promiscuous mode [ 229.629857][T13012] device syzkaller0 entered promiscuous mode [ 229.673318][T13027] device veth0_vlan left promiscuous mode [ 229.691671][T13027] device veth0_vlan entered promiscuous mode [ 229.748494][T13033] device pim6reg1 entered promiscuous mode [ 229.758357][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.768777][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.828768][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.081896][T13073] device sit0 left promiscuous mode [ 230.169534][T13073] device sit0 entered promiscuous mode [ 230.401790][T13071] device syzkaller0 entered promiscuous mode [ 230.511629][T13082] device syzkaller0 entered promiscuous mode [ 231.143174][T13124] syz.3.3673[13124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.143266][T13124] syz.3.3673[13124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.600026][T13143] device syzkaller0 entered promiscuous mode [ 233.096847][T13238] device pim6reg1 entered promiscuous mode [ 233.208920][T13248] -1: renamed from syzkaller0 [ 233.277083][T13253] device sit0 left promiscuous mode [ 233.356596][T13253] device sit0 entered promiscuous mode [ 234.198067][T13290] device syzkaller0 entered promiscuous mode [ 235.116287][T13345] device wg2 entered promiscuous mode [ 235.634425][T13370] device syzkaller0 entered promiscuous mode [ 235.802547][T13374] device veth0_vlan left promiscuous mode [ 235.846147][T13374] device veth0_vlan entered promiscuous mode [ 236.897876][T13429] device wg2 left promiscuous mode [ 236.940544][T13429] device wg2 entered promiscuous mode [ 237.232046][T13436] device pim6reg1 entered promiscuous mode [ 237.523357][T13456] device sit0 left promiscuous mode [ 237.652203][T13461] device syzkaller0 entered promiscuous mode [ 237.659076][T13456] device sit0 entered promiscuous mode [ 238.221782][T13502] device veth1 entered promiscuous mode [ 239.492395][T13575] device wg2 left promiscuous mode [ 239.558746][T13575] device veth1_to_team entered promiscuous mode [ 239.908948][T13609] device sit0 left promiscuous mode [ 239.990794][T13618] device sit0 entered promiscuous mode [ 240.043071][T13626] device syzkaller0 entered promiscuous mode [ 240.631893][T13691] device syzkaller0 entered promiscuous mode [ 240.755869][T13702] device pim6reg1 entered promiscuous mode [ 242.441657][T13796] device syzkaller0 entered promiscuous mode [ 243.916856][T13871] device veth1_macvtap left promiscuous mode [ 244.515602][T13911] device pim6reg1 entered promiscuous mode [ 244.582696][T13918] syz.0.3902[13918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.582920][T13919] syz.0.3902[13919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.595156][T13918] syz.0.3902[13918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.614927][T13919] syz.0.3902[13919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.658218][T13925] syz.0.3904[13925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.670239][T13925] syz.0.3904[13925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.684698][T13925] syz.0.3904[13925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.698814][T13925] syz.0.3904[13925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.719934][T13972] tap0: tun_chr_ioctl cmd 1074025677 [ 245.761875][T13972] tap0: linktype set to 23 [ 246.358570][T14002] device syzkaller0 entered promiscuous mode [ 247.896777][T14029] device syzkaller0 entered promiscuous mode [ 248.642753][T14048] device sit0 left promiscuous mode [ 249.228822][T14108] device syzkaller0 entered promiscuous mode [ 249.243919][ T4747] syzkaller0: tun_net_xmit 48 [ 249.548831][T14118] device sit0 left promiscuous mode [ 249.788909][T14159] device syzkaller0 entered promiscuous mode [ 250.281624][T14211] device sit0 entered promiscuous mode [ 251.638762][T14264] syz.1.4009[14264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.638844][T14264] syz.1.4009[14264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.084798][T14317] device veth1_macvtap left promiscuous mode [ 253.121468][T14373] device pim6reg1 entered promiscuous mode [ 253.359214][T14386] device sit0 entered promiscuous mode [ 254.236091][T14417] device sit0 left promiscuous mode [ 254.270960][T14423] tap0: tun_chr_ioctl cmd 1074025673 [ 254.357901][T14420] tap0: tun_chr_ioctl cmd 1074025680 [ 254.459662][T14443] device sit0 left promiscuous mode [ 254.490012][T14443] device sit0 entered promiscuous mode [ 255.104525][T14498] device pim6reg1 entered promiscuous mode [ 255.318756][T14520] device sit0 left promiscuous mode [ 255.348043][T14527] device sit0 entered promiscuous mode [ 256.054955][T14586] device syzkaller0 entered promiscuous mode [ 256.370068][T14579] device syzkaller0 entered promiscuous mode [ 256.424769][T14592] device veth0_vlan left promiscuous mode [ 256.431146][T14592] device veth0_vlan entered promiscuous mode [ 256.438395][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.446772][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.455811][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 256.541369][T14597] device bridge_slave_1 left promiscuous mode [ 256.549336][T14597] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.563303][T14597] device bridge_slave_0 left promiscuous mode [ 256.573942][T14597] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.947971][T14631] device syzkaller0 entered promiscuous mode [ 258.052510][T14663] tap0: tun_chr_ioctl cmd 2147767506 [ 258.536680][T14703] device wg2 left promiscuous mode [ 258.977351][T14723] device pim6reg1 entered promiscuous mode [ 260.419276][T14813] ±: renamed from pim6reg1 [ 260.488610][T14815] syz.2.4170[14815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.488680][T14815] syz.2.4170[14815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.518641][T14815] device veth0_vlan left promiscuous mode [ 260.545753][T14815] device veth0_vlan entered promiscuous mode [ 260.573345][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.592072][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.612549][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.223683][T14960] device sit0 left promiscuous mode [ 265.733639][T14959] device sit0 entered promiscuous mode [ 272.997306][T14973] device syzkaller0 entered promiscuous mode [ 273.499456][T15014] device pim6reg1 entered promiscuous mode [ 273.626314][T15026] device sit0 left promiscuous mode [ 273.780190][T15036] device sit0 entered promiscuous mode [ 274.312580][T15080] ÿ: renamed from bond_slave_0 [ 274.348098][T15088] device sit0 left promiscuous mode [ 274.374106][T15088] device sit0 entered promiscuous mode [ 275.015167][T15146] device sit0 left promiscuous mode [ 275.530041][T15193] device syzkaller0 left promiscuous mode [ 275.660119][T15202] device pim6reg1 entered promiscuous mode [ 276.955407][T15287] device pim6reg1 entered promiscuous mode [ 277.305371][T15327] device veth0_vlan left promiscuous mode [ 277.321815][T15327] device veth0_vlan entered promiscuous mode [ 278.830813][T15408] ªªªªªª: renamed from vlan0 [ 280.110116][T15477] device syzkaller0 entered promiscuous mode [ 281.089990][T15498] device wg2 entered promiscuous mode [ 281.111571][T15501] device syzkaller0 entered promiscuous mode [ 281.192875][T15504] : port 1(erspan0) entered blocking state [ 281.198934][T15504] : port 1(erspan0) entered disabled state [ 281.213788][T15504] device erspan0 entered promiscuous mode [ 281.240989][T15500] : port 1(erspan0) entered blocking state [ 281.247082][T15500] : port 1(erspan0) entered forwarding state [ 281.519073][T15515] device syzkaller0 entered promiscuous mode [ 282.018605][T15536] device sit0 left promiscuous mode [ 283.274313][T15604] device pim6reg1 entered promiscuous mode [ 283.305345][T15606] device wg2 entered promiscuous mode [ 283.587205][T15621] device syzkaller0 entered promiscuous mode [ 283.746543][T15635] device veth0_vlan left promiscuous mode [ 283.753718][T15635] device veth0_vlan entered promiscuous mode [ 283.774742][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.785044][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 283.799656][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.942499][T15643] device pim6reg1 entered promiscuous mode [ 284.642624][T15664] device syzkaller0 entered promiscuous mode [ 284.850488][T15686] device pim6reg1 entered promiscuous mode [ 285.273150][T15698] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.282703][T15698] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.300765][T15698] device bridge_slave_0 entered promiscuous mode [ 285.315329][T15698] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.382189][T15698] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.389937][T15698] device bridge_slave_1 entered promiscuous mode [ 285.485221][T15698] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.492476][T15698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.499974][T15698] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.507511][T15698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.611494][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.634227][ T643] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.642042][ T643] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.704941][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.713712][ T643] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.720743][ T643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.729518][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.738630][ T643] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.745805][ T643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.773585][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.782411][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.796704][T15698] device veth0_vlan entered promiscuous mode [ 285.804039][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.812845][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.820384][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.830305][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.848359][T15698] device veth1_macvtap entered promiscuous mode [ 285.856212][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.871843][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 285.880983][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 285.891230][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 285.899993][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 286.317399][T15752] device sit0 entered promiscuous mode [ 286.530962][T15765] device veth1_macvtap entered promiscuous mode [ 286.599229][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 287.594582][T15818] device wg2 left promiscuous mode [ 287.653541][T15823] device wg2 entered promiscuous mode [ 287.683458][T15816] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.691525][T15816] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.700261][T15816] device bridge_slave_0 entered promiscuous mode [ 287.707246][T15810] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.715099][T15810] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.722595][T15810] device bridge_slave_0 entered promiscuous mode [ 287.739699][T15816] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.747025][T15816] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.754786][T15816] device bridge_slave_1 entered promiscuous mode [ 287.782420][T15810] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.790180][T15810] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.801258][T15810] device bridge_slave_1 entered promiscuous mode [ 287.911960][T15827] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.920093][T15827] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.928894][T15827] device bridge_slave_0 entered promiscuous mode [ 287.937108][T15827] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.944470][T15827] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.952485][T15827] device bridge_slave_1 entered promiscuous mode [ 287.987708][T15810] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.995249][T15810] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.002851][T15810] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.010419][T15810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.026398][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.034207][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.068461][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.076351][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.118422][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.126195][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.134167][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.143109][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.151448][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.159025][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.167559][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 288.176788][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.185430][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.194211][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.201399][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.223040][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.231886][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.240681][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.248242][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.261573][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 288.270307][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.294219][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 288.303167][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.311578][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.323521][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.333401][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.340891][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.362148][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 288.371123][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 288.380422][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 288.389516][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.398633][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 288.407257][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.434920][T15816] device veth0_vlan entered promiscuous mode [ 288.443035][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.453659][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.461696][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.470837][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.480450][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.487986][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.497154][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.506766][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.515187][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.522696][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.530868][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.539534][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 288.548037][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.563978][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 288.571835][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 288.581589][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 288.591661][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.607573][T15816] device veth1_macvtap entered promiscuous mode [ 288.617530][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 288.626571][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 288.636940][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 288.664751][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 288.674112][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 288.682982][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 288.691619][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 288.701004][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 288.709993][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 288.719182][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 288.740696][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.749074][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 288.757411][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 288.767475][T15810] device veth0_vlan entered promiscuous mode [ 288.776812][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 288.785192][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.794069][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 288.802518][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 288.811043][T15827] device veth0_vlan entered promiscuous mode [ 288.845110][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 288.853598][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 288.866762][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 288.876287][T15810] device veth1_macvtap entered promiscuous mode [ 288.896385][T15827] device veth1_macvtap entered promiscuous mode [ 288.914343][ T296] device veth1_macvtap left promiscuous mode [ 288.920415][ T296] device veth0_vlan left promiscuous mode [ 288.979354][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 288.987699][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 288.998725][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 289.009829][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 289.018663][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 289.036170][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 289.049238][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 289.059020][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 289.067719][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 290.109014][ T296] GPL: port 1(erspan0) entered disabled state [ 290.143861][ T296] device erspan0 left promiscuous mode [ 290.159893][ T296] GPL: port 1(erspan0) entered disabled state [ 290.584365][ T296] device veth1 left promiscuous mode [ 290.606369][ T296] bridge0: port 3(veth1) entered disabled state [ 290.686092][ T296] device bridge_slave_1 left promiscuous mode [ 290.728840][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.776183][ T296] device bridge_slave_0 left promiscuous mode [ 290.798374][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.816842][ T296] device bridge_slave_1 left promiscuous mode [ 290.886937][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.927738][ T296] device bridge_slave_0 left promiscuous mode [ 290.959376][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.986998][ T296] device veth0_vlan left promiscuous mode [ 291.643873][T15973] device pim6reg1 entered promiscuous mode [ 291.738600][T15981] syz.5.4508[15981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.738675][T15981] syz.5.4508[15981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.169614][T16001] device pim6reg1 entered promiscuous mode [ 293.834581][T16074] tap0: tun_chr_ioctl cmd 2147767507 [ 294.963879][T16105] device wg2 left promiscuous mode [ 295.023568][T16105] device wg2 entered promiscuous mode [ 295.965279][T16172] device syzkaller0 entered promiscuous mode [ 296.178707][T16212] device syzkaller0 entered promiscuous mode [ 296.942425][T16254] device veth0_vlan left promiscuous mode [ 296.979812][T16254] device veth0_vlan entered promiscuous mode [ 297.165512][T16267] device veth1_macvtap left promiscuous mode [ 297.217437][T16269] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 297.246477][T16269] device syzkaller0 left promiscuous mode [ 297.939361][T16350] device veth0_vlan left promiscuous mode [ 297.946591][T16350] device veth0_vlan entered promiscuous mode [ 298.698767][T16376] device veth0_vlan left promiscuous mode [ 298.719808][T16376] device veth0_vlan entered promiscuous mode [ 299.580756][T16459] device pim6reg1 entered promiscuous mode [ 299.608536][T16456] device sit0 entered promiscuous mode [ 299.912813][T16475] ªªªªªª: renamed from vlan0 [ 300.504551][T16506] device syzkaller0 entered promiscuous mode [ 300.726166][T16529] syz.4.4670[16529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.726223][T16529] syz.4.4670[16529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.291437][T16549] device wg2 entered promiscuous mode [ 301.647674][T16585] device pim6reg1 entered promiscuous mode [ 301.714572][T16597] device pim6reg1 entered promiscuous mode [ 301.925245][T16616] device pim6reg1 entered promiscuous mode [ 302.549498][T16641] device pim6reg1 entered promiscuous mode [ 303.153307][T16680] device sit0 entered promiscuous mode [ 303.339380][T16691] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.346840][T16691] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.388229][T16691] device bridge_slave_1 left promiscuous mode [ 303.398963][T16691] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.428396][T16691] device bridge_slave_0 left promiscuous mode [ 303.436697][T16691] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.400769][T16792] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.410048][T16792] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.576822][T16792] device bridge_slave_1 left promiscuous mode [ 304.588707][T16792] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.624049][T16792] device bridge_slave_0 left promiscuous mode [ 304.637689][T16792] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.212347][T16892] device wg2 left promiscuous mode [ 305.433584][T16905] device syzkaller0 entered promiscuous mode [ 308.815633][T17040] device syzkaller0 entered promiscuous mode [ 308.938581][T17044] device syzkaller0 entered promiscuous mode [ 309.069450][T17059] device pim6reg1 entered promiscuous mode [ 309.186119][T17082] device syzkaller0 entered promiscuous mode [ 309.974426][T17148] device syzkaller0 entered promiscuous mode [ 310.680723][T17185] device sit0 left promiscuous mode [ 310.928433][T17187] device sit0 entered promiscuous mode [ 311.136665][T17212] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.144367][T17212] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.027079][T17253] device syzkaller0 entered promiscuous mode [ 312.438311][T17329] lo: mtu less than device minimum [ 313.351424][T17362] device syzkaller0 left promiscuous mode [ 313.778041][T17387] device pim6reg1 entered promiscuous mode [ 315.403188][T17488] syz.7.4947[17488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.403250][T17488] syz.7.4947[17488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.461913][T17496] device pim6reg1 entered promiscuous mode [ 315.924337][T17545] device syzkaller0 entered promiscuous mode [ 315.978514][T17547] device wg2 entered promiscuous mode [ 316.360026][T17599] device syzkaller0 entered promiscuous mode [ 316.904240][T17636] device wg2 left promiscuous mode [ 316.998985][T17655] device pim6reg1 entered promiscuous mode [ 317.104523][T17664] device syzkaller0 left promiscuous mode [ 317.370097][T17681] device syzkaller0 entered promiscuous mode [ 318.465190][T17768] syz.7.5025[17768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.465254][T17768] syz.7.5025[17768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.910362][T17790] device syzkaller0 entered promiscuous mode [ 319.486204][T17833] device pim6reg1 entered promiscuous mode [ 320.292210][T17873] device veth0_vlan left promiscuous mode [ 320.363922][T17873] device veth0_vlan entered promiscuous mode [ 320.469869][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.490569][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.549278][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.568307][T17945] device syzkaller0 entered promiscuous mode [ 321.848643][ T24] audit: type=1400 audit(1758186253.040:177): avc: denied { setattr } for pid=17982 comm="syz.7.5086" path="pipe:[70364]" dev="pipefs" ino=70364 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 321.974973][T17975] device syzkaller0 entered promiscuous mode [ 322.430840][T18014] device pim6reg1 entered promiscuous mode [ 322.544045][T18017] ªªªªªª: renamed from vlan0 [ 322.797851][T18048] device veth1_macvtap left promiscuous mode [ 322.810508][T18048] device macsec0 entered promiscuous mode [ 323.350653][T18098] : port 1(erspan0) entered blocking state [ 323.356792][T18098] : port 1(erspan0) entered disabled state [ 323.369587][T18098] device erspan0 entered promiscuous mode [ 324.363085][T18160] device wg2 left promiscuous mode [ 324.419252][T18161] device wg2 entered promiscuous mode [ 324.549629][T18169] syz.4.5139[18169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.549734][T18169] syz.4.5139[18169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.573458][T18172] device syzkaller0 entered promiscuous mode [ 325.706623][T18218] device syzkaller0 entered promiscuous mode [ 325.774146][T18241] device wg2 entered promiscuous mode [ 325.929135][T18265] device wg2 left promiscuous mode [ 328.628339][T18415] device sit0 left promiscuous mode [ 329.020573][T18459] device syzkaller0 left promiscuous mode [ 329.367234][T18474] device sit0 left promiscuous mode [ 329.597235][T18478] device sit0 entered promiscuous mode [ 329.652813][T18489] device pim6reg1 entered promiscuous mode [ 329.683870][T18493] device sit0 entered promiscuous mode [ 330.510697][T18527] device veth1_macvtap entered promiscuous mode [ 330.552971][T18527] device macsec0 entered promiscuous mode [ 330.602778][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 332.201554][T18627] device syzkaller0 entered promiscuous mode [ 333.401417][T18698] device sit0 left promiscuous mode [ 334.040051][T18741] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 334.399418][T18775] device pim6reg1 entered promiscuous mode [ 334.491712][T18773] device veth0_vlan left promiscuous mode [ 334.556313][T18773] device veth0_vlan entered promiscuous mode [ 334.612803][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.647803][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 334.675954][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 335.007778][T18800] device syzkaller0 entered promiscuous mode [ 335.401733][T18819] device veth1_macvtap left promiscuous mode [ 335.456565][T18819] device veth1_macvtap entered promiscuous mode [ 335.463520][T18819] device macsec0 entered promiscuous mode [ 335.503915][T18838] device wg2 entered promiscuous mode [ 335.625469][T18864] syz.4.5350[18864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.625553][T18864] syz.4.5350[18864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.909002][T18884] device wg2 entered promiscuous mode [ 336.216793][T18901] device syzkaller0 entered promiscuous mode [ 336.848961][T18958] device syzkaller0 entered promiscuous mode [ 336.868494][T18952] IPv6: pim6reg1: Disabled Multicast RS [ 338.019066][T18999] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.027568][T18999] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.055961][T19004] device sit0 entered promiscuous mode [ 338.719872][T19051] device sit0 entered promiscuous mode [ 340.402307][T19129] device wg2 entered promiscuous mode [ 340.781652][T19147] device pim6reg1 entered promiscuous mode [ 340.901840][T19152] device veth1_macvtap left promiscuous mode [ 340.924917][T19152] device macsec0 left promiscuous mode [ 341.023600][T19152] device veth1_macvtap entered promiscuous mode [ 341.030022][T19152] device macsec0 entered promiscuous mode [ 341.645540][T19209] device sit0 left promiscuous mode [ 341.669760][T19209] device sit0 entered promiscuous mode [ 342.973403][T19317] device wg2 left promiscuous mode [ 343.462758][T19345] syz.6.5491[19345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.498732][T19349] device wg2 entered promiscuous mode [ 343.789655][T19363] device wg2 left promiscuous mode [ 344.390252][T19400] lo: mtu less than device minimum [ 344.402380][T19393] device pim6reg1 entered promiscuous mode [ 344.444227][T19408] ÿÿÿÿÿÿ: renamed from vlan1 [ 344.806351][T19430] device bridge_slave_1 left promiscuous mode [ 344.814773][T19430] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.894955][T19430] device bridge_slave_0 left promiscuous mode [ 344.916331][T19430] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.080626][T19451] syz.6.5523[19451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.080684][T19451] syz.6.5523[19451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.182934][T19465] device pim6reg1 entered promiscuous mode [ 346.263559][T19488] IPv6: sit1: Disabled Multicast RS [ 347.718806][T19573] device sit0 left promiscuous mode [ 348.086552][T19593] device syzkaller0 entered promiscuous mode [ 348.107534][ T6453] syzkaller0: tun_net_xmit 48 [ 348.256338][T19596] device syzkaller0 entered promiscuous mode [ 349.484059][T19648] syz.6.5583[19648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.484126][T19648] syz.6.5583[19648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.882211][T19695] device pim6reg1 entered promiscuous mode [ 350.319011][T19736] device syzkaller0 entered promiscuous mode [ 350.935878][T19753] device syzkaller0 entered promiscuous mode [ 350.990843][T19755] device veth0_vlan left promiscuous mode [ 351.022893][T19755] device veth0_vlan entered promiscuous mode [ 351.489616][T19790] device syzkaller0 entered promiscuous mode [ 351.872243][T19803] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.880400][T19803] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.888672][T19803] device bridge_slave_0 entered promiscuous mode [ 351.896900][T19803] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.904264][T19803] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.912428][T19803] device bridge_slave_1 entered promiscuous mode [ 351.999969][T19804] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.008170][T19804] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.018181][T19804] device bridge_slave_0 entered promiscuous mode [ 352.029109][T19804] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.039383][T19804] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.048283][T19804] device bridge_slave_1 entered promiscuous mode [ 352.103203][T19807] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.110824][T19807] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.118833][T19807] device bridge_slave_0 entered promiscuous mode [ 352.130649][T19803] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.138180][T19803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.146356][T19803] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.154694][T19803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.187549][T19807] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.229147][T19807] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.237237][T19807] device bridge_slave_1 entered promiscuous mode [ 352.327264][T19804] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.335068][T19804] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.342803][T19804] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.350126][T19804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.382356][T19835] device sit0 left promiscuous mode [ 352.446892][ T643] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.455632][ T643] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.463902][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.473691][ T643] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.481518][ T643] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.510777][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.520021][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 352.529790][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.538582][ T643] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.546685][ T643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.556376][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.564853][ T643] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.572177][ T643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.582934][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 352.594141][ T643] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.601542][ T643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.609813][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 352.619481][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 352.629259][T19839] €Â0: renamed from pim6reg1 [ 352.657084][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 352.665865][ T643] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.673700][ T643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.683285][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 352.693540][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 352.702135][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 352.723011][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 352.730878][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 352.740635][T19803] device veth0_vlan entered promiscuous mode [ 352.760571][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 352.769667][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 352.786819][T19803] device veth1_macvtap entered promiscuous mode [ 352.796978][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 352.807426][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 352.816703][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 352.853118][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 352.869672][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 352.888604][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 352.901051][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 352.910365][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 352.921830][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 352.944362][T19804] device veth0_vlan entered promiscuous mode [ 352.955714][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 352.963906][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.972007][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 352.984762][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.993660][ T643] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.001300][ T643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.009674][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 353.018594][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.028150][ T643] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.036097][ T643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.044605][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 353.052951][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.061820][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 353.070064][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.078318][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 353.094280][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.102926][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.138639][T19804] device veth1_macvtap entered promiscuous mode [ 353.160951][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 353.194505][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 353.208615][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 353.218225][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.227557][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.274000][T19888] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.281583][T19888] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.303848][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 353.329563][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 353.368893][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 353.420848][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 353.465368][T19888] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.473960][T19888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.482648][T19888] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.490363][T19888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.536081][T19888] device bridge0 entered promiscuous mode [ 353.569971][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 353.584435][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.599655][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.614047][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 353.632816][T19807] device veth0_vlan entered promiscuous mode [ 353.666553][ T296] device erspan0 left promiscuous mode [ 353.698456][ T296] : port 1(erspan0) entered disabled state [ 353.735533][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 353.753778][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 353.788467][T19807] device veth1_macvtap entered promiscuous mode [ 353.839056][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 353.862733][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 353.887081][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 353.934394][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 353.962459][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 354.266616][ T296] device bridge_slave_1 left promiscuous mode [ 354.293742][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.338816][ T296] device bridge_slave_0 left promiscuous mode [ 354.372544][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.425700][ T296] device bridge_slave_1 left promiscuous mode [ 354.472154][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.482882][ T296] device bridge_slave_0 left promiscuous mode [ 354.489503][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.544315][ T296] device veth1_macvtap left promiscuous mode [ 354.560796][ T296] device veth1_macvtap left promiscuous mode [ 354.567455][ T296] device veth0_vlan left promiscuous mode [ 355.191657][T20013] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.199542][T20013] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.322235][T20015] device bridge_slave_1 left promiscuous mode [ 355.329061][T20015] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.385550][T20015] device bridge_slave_0 left promiscuous mode [ 355.399517][T20015] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.728473][T20051] device wg2 entered promiscuous mode [ 356.054830][T20071] device wg2 entered promiscuous mode [ 356.155607][T20079] syz.9.5706[20079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.155817][T20079] syz.9.5706[20079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.351389][T20079] device veth0_vlan left promiscuous mode [ 356.413699][T20079] device veth0_vlan entered promiscuous mode [ 356.473915][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 356.484713][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 356.498259][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 356.507131][T20110] device sit0 entered promiscuous mode [ 356.775909][T20150] syz.9.5724[20150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.775970][T20150] syz.9.5724[20150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.122134][ C1] syzkaller0: tun_net_xmit 76 [ 357.146978][T20170] device syzkaller0 entered promiscuous mode [ 357.158553][T20170] syzkaller0: tun_net_xmit 1280 [ 357.164567][T20170] syzkaller0: create flow: hash 3608109499 index 1 [ 357.175234][T20175] device pim6reg1 entered promiscuous mode [ 357.183305][T20169] syzkaller0: delete flow: hash 3608109499 index 1 [ 357.459306][T20186] device sit0 entered promiscuous mode [ 357.945486][T20222] device syzkaller0 entered promiscuous mode [ 358.717744][T20256] syz.8.5753[20256] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.717832][T20256] syz.8.5753[20256] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.990429][T20252] device veth0_vlan left promiscuous mode [ 359.050406][T20252] device veth0_vlan entered promiscuous mode [ 359.290434][T20267] device veth1_macvtap left promiscuous mode [ 359.606015][T20283] device syzkaller0 entered promiscuous mode [ 361.525714][T20360] device pim6reg1 entered promiscuous mode [ 361.547977][T20363] device pim6reg1 entered promiscuous mode [ 362.133410][T20408] device veth0_vlan left promiscuous mode [ 362.144604][T20408] device veth0_vlan entered promiscuous mode [ 362.217262][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 362.229867][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 362.240880][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 362.633553][T20440] device syzkaller0 entered promiscuous mode [ 362.681353][T20448] device sit0 entered promiscuous mode [ 362.966388][T20445] device sit0 left promiscuous mode [ 363.478545][T20488] device veth1_to_bond entered promiscuous mode [ 365.224849][T20579] device wg2 entered promiscuous mode [ 366.395172][T20647] device wg2 entered promiscuous mode [ 366.805459][T20683] device syzkaller0 entered promiscuous mode [ 368.228094][T20772] device pim6reg1 entered promiscuous mode [ 368.996242][T20805] device wg2 left promiscuous mode [ 369.533097][T20830] device wg2 left promiscuous mode [ 369.611881][T20836] device wg2 entered promiscuous mode [ 369.723169][T20841] syz.8.5923[20841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.733916][T20841] device pim6reg1 entered promiscuous mode [ 370.076690][T20885] €Â0: renamed from pim6reg1 [ 370.230978][T20923] device wg2 left promiscuous mode [ 370.365164][T20933] : renamed from pim6reg1 [ 370.415383][T20940] device sit0 left promiscuous mode [ 370.561339][T20937] device syzkaller0 entered promiscuous mode [ 370.588116][T20942] device sit0 entered promiscuous mode [ 370.708794][T20946] device syzkaller0 entered promiscuous mode [ 371.289469][T20986] syz.0.5964[20986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.289552][T20986] syz.0.5964[20986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.318056][T20987] device pim6reg1 entered promiscuous mode [ 371.941365][T21050] device veth0_vlan left promiscuous mode [ 371.984615][T21050] device veth0_vlan entered promiscuous mode [ 372.960214][T21152] device dummy0 entered promiscuous mode [ 373.497277][T21177] syz.9.6017[21177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.497337][T21177] syz.9.6017[21177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.407575][T21211] device syzkaller0 entered promiscuous mode [ 374.574725][T21247] device wg2 left promiscuous mode [ 374.675338][T21249] device wg2 entered promiscuous mode [ 374.906617][T21276] device sit0 left promiscuous mode [ 375.007631][T21282] bridge0: port 3(gretap0) entered blocking state [ 375.057867][T21282] bridge0: port 3(gretap0) entered disabled state [ 375.115126][T21282] device gretap0 entered promiscuous mode [ 375.144231][T21282] bridge0: port 3(gretap0) entered blocking state [ 375.152329][T21282] bridge0: port 3(gretap0) entered forwarding state [ 375.905645][T21356] device syzkaller0 entered promiscuous mode [ 376.145414][T21391] device veth1_macvtap left promiscuous mode [ 376.186340][T21391] device macsec0 entered promiscuous mode [ 377.190593][T21462] device veth0_vlan left promiscuous mode [ 377.231438][T21462] device veth0_vlan entered promiscuous mode [ 377.278696][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 377.310182][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 377.358322][ T643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 377.384234][T21459] device pim6reg1 entered promiscuous mode [ 377.599590][T21467] device veth0_vlan left promiscuous mode [ 377.641504][T21467] device veth0_vlan entered promiscuous mode [ 378.314231][T21497] @ÿ: renamed from bond_slave_0 [ 379.317043][T21556] device pim6reg1 entered promiscuous mode [ 379.721905][T21581] device pim6reg1 entered promiscuous mode [ 380.085934][T21605] device syzkaller0 entered promiscuous mode [ 380.193544][T21607] device sit0 entered promiscuous mode [ 380.785320][T21641] device syzkaller0 entered promiscuous mode [ 380.935765][T21652] GPL: port 1(vlan0) entered blocking state [ 380.941868][T21652] GPL: port 1(vlan0) entered disabled state [ 380.948899][T21652] device vlan0 entered promiscuous mode [ 382.011744][T21727] ÿÿÿÿÿÿ: renamed from vlan1 [ 382.272261][T21740] bridge0: port 3(gretap0) entered disabled state [ 382.279156][T21740] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.287890][T21740] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.553885][T21771] device pim6reg1 entered promiscuous mode [ 384.484362][T21868] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 384.529484][T21868] device pim6reg1 entered promiscuous mode [ 384.631551][T21873] device pim6reg1 entered promiscuous mode [ 384.680101][T21875] device pim6reg1 entered promiscuous mode [ 386.753822][T21983] device sit0 left promiscuous mode [ 386.923467][T21983] device sit0 entered promiscuous mode [ 387.102422][T21991] device wg2 left promiscuous mode [ 387.122855][ T24] audit: type=1400 audit(1758186318.340:178): avc: denied { create } for pid=22006 comm="syz.0.6257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 387.394715][T22010] device syzkaller0 entered promiscuous mode [ 388.282622][T22075] device sit0 entered promiscuous mode [ 388.884209][T22094] device veth1_macvtap left promiscuous mode [ 389.158995][T22088] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.191749][T22088] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.210868][T22088] device bridge_slave_0 entered promiscuous mode [ 389.260122][T22088] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.302160][T22088] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.315517][T22088] device bridge_slave_1 entered promiscuous mode [ 389.373144][T22116] device sit0 entered promiscuous mode [ 389.605866][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 389.618887][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 389.660460][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 389.671748][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 389.680907][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.688296][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.702482][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 389.711458][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 389.720430][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.727748][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.772523][ T391] : port 1(erspan0) entered disabled state [ 389.784857][ T391] device erspan0 left promiscuous mode [ 389.810703][ T391] : port 1(erspan0) entered disabled state [ 389.883275][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 389.915822][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 389.987027][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 390.153995][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 390.198983][T22088] device veth0_vlan entered promiscuous mode [ 390.236092][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 390.270197][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 390.329112][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 390.408065][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 390.422342][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 390.462627][T22088] device veth1_macvtap entered promiscuous mode [ 390.473710][ T391] device veth1_macvtap left promiscuous mode [ 390.480802][ T391] device veth0_vlan left promiscuous mode [ 390.691907][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 390.710115][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 390.724386][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 390.734807][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 390.758414][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 391.387247][T22248] device syzkaller0 entered promiscuous mode [ 391.423748][T22250] device syzkaller0 entered promiscuous mode [ 391.614719][T22260] device pim6reg1 entered promiscuous mode [ 393.024523][T22338] device wg2 entered promiscuous mode [ 394.642433][T22396] device syzkaller0 entered promiscuous mode [ 397.341260][T22472] bridge0: mtu less than device minimum [ 397.650040][T22510] device pim6reg1 entered promiscuous mode [ 398.236008][T22529] device pim6reg1 entered promiscuous mode [ 398.572307][T22560] device pim6reg1 entered promiscuous mode [ 398.790406][T22575] syz.4.6424[22575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.791622][T22575] syz.4.6424[22575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.871485][T22575] syz.4.6424[22575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.895833][T22575] syz.4.6424[22575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.494041][T22604] -1: renamed from syzkaller0 [ 399.799278][T22624] syz.1.6437[22624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.799334][T22624] syz.1.6437[22624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.399480][T22651] device pim6reg1 entered promiscuous mode [ 401.360956][T22726] device veth0_vlan left promiscuous mode [ 401.367748][T22726] device veth0_vlan entered promiscuous mode [ 401.644426][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.659491][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.682738][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 404.059962][T22885] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.068468][T22885] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.178033][T22885] device bridge_slave_1 left promiscuous mode [ 404.204615][T22885] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.227807][T22885] device bridge_slave_0 left promiscuous mode [ 404.242814][T22885] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.831247][T22950] device pimreg0 entered promiscuous mode [ 407.632245][T22974] GPL: port 1(erspan0) entered blocking state [ 407.639135][T22974] GPL: port 1(erspan0) entered disabled state [ 407.666340][T22974] device erspan0 entered promiscuous mode [ 408.819922][T23048] device pim6reg1 entered promiscuous mode [ 409.128601][T23060] device veth1_macvtap left promiscuous mode [ 409.135324][T23060] device macsec0 left promiscuous mode [ 409.637239][T23114] device syzkaller0 entered promiscuous mode [ 409.784054][T23137] device wg2 left promiscuous mode [ 410.035836][T23137] device syzkaller0 entered promiscuous mode [ 410.167299][T23165] syz.1.6593[23165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.167361][T23165] syz.1.6593[23165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.562907][T23303] device wg2 left promiscuous mode [ 412.607377][T23303] device wg2 entered promiscuous mode [ 412.632900][T23314] device wg2 entered promiscuous mode [ 412.927972][T23329] device syzkaller0 entered promiscuous mode [ 413.709379][T23356] device veth0_vlan left promiscuous mode [ 413.736498][T23356] device veth0_vlan entered promiscuous mode [ 413.773498][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 413.783226][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 413.791337][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 414.160882][T23422] device syzkaller0 entered promiscuous mode [ 414.213100][T23439] device wg2 entered promiscuous mode [ 414.242098][T23444] device wg2 left promiscuous mode [ 414.493758][T23453] device pim6reg1 entered promiscuous mode [ 415.842150][T23518] device pim6reg1 entered promiscuous mode [ 416.573639][T23553] device syzkaller0 entered promiscuous mode [ 416.884474][T23584] device pim6reg1 entered promiscuous mode [ 417.281917][T23618] device syzkaller0 entered promiscuous mode [ 418.505800][T23675] device sit0 left promiscuous mode [ 418.659996][T23682] device wg2 left promiscuous mode [ 418.748540][T23684] device pim6reg1 entered promiscuous mode [ 418.880255][T23693] device pim6reg1 entered promiscuous mode [ 419.276924][T23729] device pim6reg1 entered promiscuous mode [ 419.388610][T23736] device syzkaller0 entered promiscuous mode [ 419.795852][T23750] syz.4.6763[23750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.797370][T23750] syz.4.6763[23750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.109375][T23767] device wg2 entered promiscuous mode [ 420.456162][T23800] device pim6reg1 entered promiscuous mode [ 420.768071][T23818] device pim6reg1 entered promiscuous mode [ 421.342105][T23845] device syzkaller0 entered promiscuous mode [ 421.369607][T23850] device pim6reg1 entered promiscuous mode [ 421.540252][T23872] device pim6reg1 left promiscuous mode [ 421.752625][T23886] syz.0.6805[23886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.752684][T23886] syz.0.6805[23886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.803919][T23885] syz.0.6805[23885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.890988][T23957] device pim6reg1 entered promiscuous mode [ 423.122007][T23965] device veth1_to_team entered promiscuous mode [ 423.233941][T23965] device wg2 entered promiscuous mode [ 423.388984][T23986] device syzkaller0 entered promiscuous mode [ 423.519039][T23983] device pim6reg1 entered promiscuous mode [ 424.623534][T24046] device pim6reg1 entered promiscuous mode [ 424.927848][T24067] syz.4.6861[24067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.927938][T24067] syz.4.6861[24067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.044448][T24065] device syzkaller0 entered promiscuous mode [ 425.363839][ T24] audit: type=1400 audit(1758186356.580:179): avc: denied { create } for pid=24080 comm="syz.1.6866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 426.694328][T24120] device syzkaller0 entered promiscuous mode [ 427.284244][T24172] syz.8.6890[24172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.284334][T24172] syz.8.6890[24172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.318857][T24179] device syzkaller0 entered promiscuous mode [ 427.340823][T24173] syz.8.6890[24173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.340919][T24173] syz.8.6890[24173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.183549][T24302] device syzkaller0 entered promiscuous mode [ 429.559408][T24315] device sit0 left promiscuous mode [ 430.318273][T24350] device syzkaller0 entered promiscuous mode [ 430.336216][T24352] device pim6reg1 entered promiscuous mode [ 431.027836][T24421] device syzkaller0 entered promiscuous mode [ 431.642118][T24473] Ÿë: port 1(veth0_vlan) entered blocking state [ 431.648764][T24473] Ÿë: port 1(veth0_vlan) entered disabled state [ 431.768053][T24485] device wg2 left promiscuous mode [ 450.663215][T24529] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.670272][T24529] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.677927][T24529] device bridge_slave_0 entered promiscuous mode [ 450.694446][T24530] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.701584][T24530] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.709944][T24530] device bridge_slave_0 entered promiscuous mode [ 450.724677][T24529] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.732174][T24529] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.739642][T24529] device bridge_slave_1 entered promiscuous mode [ 450.746368][T24530] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.753638][T24530] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.761107][T24530] device bridge_slave_1 entered promiscuous mode [ 450.786269][T24532] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.793935][T24532] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.801661][T24532] device bridge_slave_0 entered promiscuous mode [ 450.811136][T24532] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.818810][T24532] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.826593][T24532] device bridge_slave_1 entered promiscuous mode [ 450.848371][T24531] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.856239][T24531] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.863851][T24531] device bridge_slave_0 entered promiscuous mode [ 450.882539][T24533] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.890091][T24533] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.897845][T24533] device bridge_slave_0 entered promiscuous mode [ 450.906648][T24531] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.914339][T24531] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.922375][T24531] device bridge_slave_1 entered promiscuous mode [ 450.942585][T24533] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.949820][T24533] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.957525][T24533] device bridge_slave_1 entered promiscuous mode [ 451.071869][T24530] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.079319][T24530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.087039][T24530] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.094177][T24530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.130316][T24529] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.138144][T24529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.145570][T24529] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.152795][T24529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.172262][T24531] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.179727][T24531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.187164][T24531] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.194398][T24531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.213326][T24533] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.220648][T24533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.228249][T24533] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.235573][T24533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.253053][T24532] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.260711][T24532] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.268392][T24532] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.275523][T24532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.295701][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 451.303759][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.311719][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.319335][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 451.328873][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 451.338253][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.346112][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.354071][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.361812][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.369197][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.376689][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.389849][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 451.414123][ T9] device vlan0 left promiscuous mode [ 451.419903][ T9] GPL: port 1(vlan0) entered disabled state [ 451.427579][ T9] device veth0_vlan left promiscuous mode [ 451.502745][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 451.510428][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 451.518483][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 451.527149][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 451.537157][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.544352][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.552424][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 451.560744][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.568137][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.576165][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 451.584670][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 451.593444][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 451.601803][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.609703][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.617801][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 451.626394][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.633570][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.641340][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 451.649561][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 451.684339][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 451.695418][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.702935][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.711137][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 451.720522][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.728157][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.735858][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 451.744572][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 451.753416][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 451.762449][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 451.771210][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 451.784651][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 451.793114][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 451.811519][T24530] device veth0_vlan entered promiscuous mode [ 451.823433][T24531] device veth0_vlan entered promiscuous mode [ 451.830512][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 451.840416][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 451.849815][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 451.859074][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 451.867986][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 451.876829][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 451.885342][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 451.893750][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 451.902466][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 451.909908][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 451.918226][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 451.926367][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 451.943862][T24529] device veth0_vlan entered promiscuous mode [ 451.951451][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 451.959653][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 451.967625][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 451.976709][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 451.986070][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.993141][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.001141][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 452.009645][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.017674][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 452.026454][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 452.034825][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.041848][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.049629][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 452.057190][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 452.065680][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 452.074048][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.085973][T24530] device veth1_macvtap entered promiscuous mode [ 452.107275][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 452.117191][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 452.125198][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 452.134813][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 452.143474][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 452.151493][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 452.160302][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 452.169557][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 452.179472][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 452.188604][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 452.197347][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 452.207401][T24529] device veth1_macvtap entered promiscuous mode [ 452.223116][T24532] device veth0_vlan entered promiscuous mode [ 452.230557][T24533] device veth0_vlan entered promiscuous mode [ 452.242611][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 452.250366][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 452.259727][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 452.268444][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 452.276995][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.285391][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 452.294060][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 452.303246][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 452.311391][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 452.322170][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 452.331267][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 452.344115][T24531] device veth1_macvtap entered promiscuous mode [ 452.355888][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 452.364531][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 452.373176][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 452.386587][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 452.395129][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 452.408157][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 452.417580][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 452.447397][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 452.456324][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 452.465767][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 452.485457][T24532] device veth1_macvtap entered promiscuous mode [ 452.499607][T24533] device veth1_macvtap entered promiscuous mode [ 452.510430][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 452.575621][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 452.590481][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 452.606030][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 452.617386][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 452.626812][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 452.635978][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 452.645819][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 452.655236][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 452.750755][T24570] device sit0 entered promiscuous mode [ 452.784632][T24564] device wg2 entered promiscuous mode [ 453.088241][ T9] device erspan0 left promiscuous mode [ 453.107447][ T9] GPL: port 1(erspan0) entered disabled state [ 453.248928][ T9] device gretap0 left promiscuous mode [ 453.292511][ T9] bridge0: port 3(gretap0) entered disabled state [ 453.570104][ T9] device bridge_slave_1 left promiscuous mode [ 453.585344][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.621571][ T9] device bridge_slave_0 left promiscuous mode [ 453.665918][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.715939][ T9] Ÿë: port 1(veth0_vlan) entered disabled state [ 453.755656][ T9] device bridge_slave_1 left promiscuous mode [ 453.793344][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.826247][ T9] device bridge_slave_0 left promiscuous mode [ 453.852824][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.893048][ T9] device veth1_macvtap left promiscuous mode [ 455.951313][T24638] device wg2 entered promiscuous mode [ 456.166710][T24662] device pim6reg1 entered promiscuous mode [ 457.016082][T24703] device wg2 entered promiscuous mode [ 457.761065][T24733] device pim6reg1 entered promiscuous mode [ 457.993318][T24774] device wg2 left promiscuous mode [ 458.059903][T24782] device wg2 entered promiscuous mode [ 458.195863][T24793] syz.6.7057[24793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 458.195955][T24793] syz.6.7057[24793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.253715][T24875] syz.3.7079[24875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.298974][T24875] syz.3.7079[24875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.397594][T24891] syz.3.7084[24891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.432196][T24891] syz.3.7084[24891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.521923][T24896] device syzkaller0 entered promiscuous mode [ 459.904319][T24911] device sit0 entered promiscuous mode [ 460.911186][T24997] device sit0 entered promiscuous mode [ 461.218957][T25001] device syzkaller0 entered promiscuous mode [ 461.805686][T25089] device veth0_vlan left promiscuous mode [ 461.846207][T25089] device veth0_vlan entered promiscuous mode [ 461.883431][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 461.893757][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 461.901797][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 462.745828][T25111] device veth1_macvtap left promiscuous mode [ 462.783486][T25111] device macsec0 entered promiscuous mode [ 464.115071][T25211] device pim6reg1 entered promiscuous mode [ 464.132561][T25216] device sit0 left promiscuous mode [ 464.156413][T25209] device sit0 entered promiscuous mode [ 464.234431][T25219] syz.6.7177[25219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.234551][T25219] syz.6.7177[25219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.065200][T25324] device veth0_vlan left promiscuous mode [ 466.172350][T25324] device veth0_vlan entered promiscuous mode [ 466.927724][T25378] device veth0_vlan left promiscuous mode [ 466.967593][T25378] device veth0_vlan entered promiscuous mode [ 467.468159][T25405] device wg2 left promiscuous mode [ 468.816489][T25487] device veth0_vlan left promiscuous mode [ 468.849916][T25487] device veth0_vlan entered promiscuous mode [ 469.913725][T25541] syz.2.7261[25541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.915159][T25541] syz.2.7261[25541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.810157][T25628] device sit0 left promiscuous mode [ 470.936361][T25637] device sit0 entered promiscuous mode [ 471.068576][T25654] device wg2 left promiscuous mode [ 471.095264][T25655] device syzkaller0 entered promiscuous mode [ 471.106684][T25654] device wg2 entered promiscuous mode [ 471.269361][T25655] device veth1_macvtap left promiscuous mode [ 472.930200][T25801] ÿÿÿÿÿÿ: renamed from vlan1 [ 472.968047][T25807] device veth1_macvtap entered promiscuous mode [ 472.985615][T25807] device macsec0 entered promiscuous mode [ 473.003004][ T391] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 473.354442][T25822] device syzkaller0 entered promiscuous mode [ 473.450947][T25831] device syzkaller0 entered promiscuous mode [ 473.749358][T25857] device syzkaller0 entered promiscuous mode [ 477.197754][T26103] device pim6reg1 entered promiscuous mode [ 477.668808][T26126] syz.2.7427[26126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.668885][T26126] syz.2.7427[26126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.710383][T26128] device sit0 left promiscuous mode [ 477.818129][T26131] device sit0 entered promiscuous mode [ 479.476855][T26249] device wg2 entered promiscuous mode [ 480.149018][T26284] device veth1_macvtap left promiscuous mode [ 480.165496][T26284] device veth1_macvtap entered promiscuous mode [ 480.189931][T26284] device macsec0 entered promiscuous mode [ 480.983569][T26317] device veth1_macvtap left promiscuous mode [ 481.476531][T26349] device syzkaller0 entered promiscuous mode [ 481.496139][T26349] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 481.518460][T26355] syz.3.7496[26355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.518521][T26355] syz.3.7496[26355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.611827][T26355] device veth0_vlan left promiscuous mode [ 481.630129][T26355] device veth0_vlan entered promiscuous mode [ 481.643984][T26357] device pim6reg1 entered promiscuous mode